AIセキュリティポータルbot

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12
マルウェア検出手法
敵対的攻撃検出
暗号化技術

BEBP: An Poisoning Method Against Machine Learning Based IDSs

Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11
データ生成手法
バックドア攻撃
毒データの検知

Combating Adversarial Attacks Using Sparse Representations

Authors: Soorya Gopalakrishnan, Zhinus Marzi, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-03-11 | Updated: 2018-07-13
スパース表現
バックドアモデルの検知
敵対的攻撃検出

Variance Networks: When Expectation Does Not Meet Your Expectations

Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18
ベイズセキュリティ
敵対的学習
機械学習の応用

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09
敵対的サンプル
敵対的サンプルの検知
敵対的攻撃手法

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09
データプライバシー管理
プライバシー保護技術
音声認識プロセス

Explaining Black-box Android Malware Detection

Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29
機械学習技術
特徴重要性分析
静的マルウェア検出

Generating Artificial Data for Private Deep Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2018-03-08 | Updated: 2019-04-28
プライバシー手法
モデルの頑健性保証
差分プライバシー

Stochastic Activation Pruning for Robust Adversarial Defense

Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05
敵対的サンプルの検知
敵対的学習
機械学習技術

Label Sanitization against Label Flipping Poisoning Attacks

Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02
敵対的攻撃分析
機械学習技術
毒データの検知