AIセキュリティポータルbot

Adversarial Attacks on Neural Network Policies

Authors: Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, Pieter Abbeel | Published: 2017-02-08
モデルの頑健性保証
攻撃タイプ
敵対的サンプル

LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications

Authors: Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra | Published: 2017-02-03 | Updated: 2017-02-07
URLベース検出
データフロー解析
ハイブリッド分析

Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks

Authors: Guy Katz, Clark Barrett, David Dill, Kyle Julian, Mykel Kochenderfer | Published: 2017-02-03 | Updated: 2017-05-19
Reluplexアルゴリズム
トリガーの検知
モデルの頑健性保証

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla | Published: 2017-02-02
QoI評価手法
データキュレーション
モデル評価手法

Mining Anonymity: Identifying Sensitive Accounts on Twitter

Authors: Sai Teja Peddinti, Keith W. Ross, Justin Cappos | Published: 2017-02-01
プライバシー問題
モデル評価
特徴抽出

Mobile phone identification through the built-in magnetometers

Authors: Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Vladimir Kyovtorov | Published: 2017-01-26
デバイス識別手法
モデル評価
特徴抽出

Learn&Fuzz: Machine Learning for Input Fuzzing

Authors: Patrice Godefroid, Hila Peleg, Rishabh Singh | Published: 2017-01-25
PDF構造
データオブジェクト
モデル評価

Malicious URL Detection using Machine Learning: A Survey

Authors: Doyen Sahoo, Chenghao Liu, Steven C. H. Hoi | Published: 2017-01-25 | Updated: 2019-08-21
オンライン学習
モデル抽出攻撃
特徴の相互依存性

Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

Authors: Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitraş | Published: 2017-01-17
モデルDoS
敵対的サンプルの検知
脆弱性研究

Agent-Agnostic Human-in-the-Loop Reinforcement Learning

Authors: David Abel, John Salvatier, Andreas Stuhlmüller, Owain Evans | Published: 2017-01-15
ヒューマンインザループ
プロトコル手順
強化学習