AIセキュリティポータルbot

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
ユーザー行動分析
ユーザ行動分析
通信解析

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11
プライバシー保護手法
差分プライバシー
統計的手法

Universal Successor Representations for Transfer Reinforcement Learning

Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11
強化学習手法
知識移転性

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
モデルの頑健性保証
敵対的攻撃
透かし

Adversarial Training Versus Weight Decay

Authors: Angus Galloway, Thomas Tanay, Graham W. Taylor | Published: 2018-04-10 | Updated: 2018-07-23
モデルの頑健性保証
敵対的学習
敵対的攻撃

An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks

Authors: Pu Zhao, Sijia Liu, Yanzhi Wang, Xue Lin | Published: 2018-04-09
バックドアモデルの検知
敵対的サンプル
敵対的攻撃

The Challenges in SDN/ML Based Network Security : A Survey

Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14
SDNセキュリティソリューション
モデル抽出攻撃
異常検知手法

A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks

Authors: Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song | Published: 2018-04-07
大規模言語モデル
時間に関連する特徴
統計的分析

Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations

Authors: Alex Lamb, Jonathan Binas, Anirudh Goyal, Dmitriy Serdyuk, Sandeep Subramanian, Ioannis Mitliagkas, Yoshua Bengio | Published: 2018-04-07
モデルの頑健性保証
敵対的攻撃
深層ネットワークの堅牢性

Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10
バックドア攻撃
ポイズニング
毒データの検知