AIセキュリティポータルbot

Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?

Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28
セキュリティ分析
ユーザー認証システム
動的アクセス制御

Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework

Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03
Q学習アルゴリズム
攻撃の分類
異常検出手法

An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01
ユーザー認証システム
性能評価指標
機械学習のプライバシー保護

Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin

Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26
トレードオフ分析
トレーニング手法
敵対的サンプル

On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04
ポイズニング
効果的な摂動手法
敵対的移転性

Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning

Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25
トレーニング手法
敵対的サンプル
敵対的移転性

Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24
MLベースのIDS
データ依存性
特徴の相互依存性

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24
サイバー脅威
ユーザー行動分析
悪意のあるプロンプト

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10
セキュリティ保証
プライバシー保護
性能評価

Enhancing Adversarial Example Transferability with an Intermediate Level Attack

Authors: Qian Huang, Isay Katsman, Horace He, Zeqi Gu, Serge Belongie, Ser-Nam Lim | Published: 2019-07-23 | Updated: 2020-02-27
効果的な摂動手法
敵対的サンプル
敵対的移転性