AIセキュリティポータルbot

Wavelet decomposition of software entropy reveals symptoms of malicious code

Authors: Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao | Published: 2016-07-18 | Updated: 2018-02-02
エネルギー管理
モデル評価手法
特徴選択手法

Adversarial examples in the physical world

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-07-08 | Updated: 2017-02-11
モデルの頑健性保証
敵対的サンプル
敵対的移転性

Deciphering Malware’s use of TLS (without Decryption)

Authors: Blake Anderson, Subharthi Paul, David McGrew | Published: 2016-07-06
TLSクライアント構成
セキュアな通信チャネル
データ抽出と分析

Bayesian Nonparametrics for Sparse Dynamic Networks

Authors: Cian Naik, Francois Caron, Judith Rousseau, Yee Whye Teh, Konstantina Palla | Published: 2016-07-06 | Updated: 2022-04-14
動的分析
収束特性
時系列分析

Deep Learning with Differential Privacy

Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2016-07-01 | Updated: 2016-10-24
プライバシー保護機械学習
差分プライバシー
深層学習

Adaptive and Scalable Android Malware Detection through Online Learning

Authors: Annamalai Narayanan, Liu Yang, Lihui Chen, Liu Jinliang | Published: 2016-06-23 | Updated: 2016-09-26
オンライン学習
セキュリティ分析
適応型誤用検出

Efficient Attack Graph Analysis through Approximate Inference

Authors: Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu | Published: 2016-06-22
ベイズセキュリティ
リスク分析手法
動的分析

An effective approach for classification of advanced malware with high accuracy

Authors: Ashu Sharma, Sanjay K. Sahay | Published: 2016-06-22
ネットワーク脅威検出
モデル評価
特徴選択

Adversarial Perturbations Against Deep Neural Networks for Malware Classification

Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel | Published: 2016-06-14 | Updated: 2016-06-16
モデルの頑健性保証
敵対的サンプル
敵対的攻撃評価

The Crossover Process: Learnability and Data Protection from Inference Attacks

Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07
モデル評価
収束特性
因果推論