AIセキュリティポータルbot

Adaptive Normalized Risk-Averting Training For Deep Neural Networks

Authors: Zhiguang Wang, Tim Oates, James Lo | Published: 2015-06-08 | Updated: 2016-06-09
敵対的学習
視覚的手法

Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning

Authors: Yarin Gal, Zoubin Ghahramani | Published: 2015-06-06 | Updated: 2016-10-04
ベイズ最適化
不確実性の定量化
深層学習手法

A Deeper Look at Dataset Bias

Authors: Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars | Published: 2015-05-06
学習データのバイアス排除
性能評価
深層学習モデル

Spectral Norm of Random Kernel Matrices with Applications to Privacy

Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson | Published: 2015-04-22
プライバシー損失分析
行列乗算手法
高次元データ分析

Detection of Information leakage in cloud

Authors: Mansaf Alam, Shuchi Sethi | Published: 2015-04-14 | Updated: 2015-11-06
セキュアな通信チャネル
仮想環境の攻撃
出力処理

Consensus based Detection in the Presence of Data Falsification Attacks

Authors: Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney | Published: 2015-04-14
ビザンチン行動に対する具体的な対策
敵対的攻撃分析
通信モデル

Machine Learning Methods for Attack Detection in the Smart Grid

Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor | Published: 2015-03-22
オンライン学習
性能評価
敵対的攻撃分析

Automated detection and classification of cryptographic algorithms in binary programs through machine learning

Authors: Diane Duros Hosfelt | Published: 2015-03-04
クラスタリング手法
機械学習によるマルウェア分類
特徴の相互依存性

Detecting Malware with Information Complexity

Authors: Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis | Published: 2015-02-26
マルウェア検出
ランダムフォレスト
情報理論的評価

Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2015-02-23 | Updated: 2016-04-27
プライバシー保護技術
学習可能性
差分プライバシー