AIセキュリティポータルbot

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25
Cybersecurity
Attack Detection
Machine Learning

Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data

Authors: Gayan K. Kulatilleke, Sugandika Samarakoon | Published: 2022-08-25
Fraudulent Transaction
Analysis of Detection Methods
Machine Learning

Credit card fraud detection – Classifier selection strategy

Authors: Gayan K. Kulatilleke | Published: 2022-08-25
Fraudulent Transaction
Machine Learning
Machine Learning Technology

Joint Privacy Enhancement and Quantization in Federated Learning

Authors: Natalie Lang, Elad Sofer, Tomer Shaked, Nir Shlezinger | Published: 2022-08-23
Privacy Violation
Efficiency of Distributed Learning
Communication Efficiency

Decentralized Collaborative Learning with Probabilistic Data Protection

Authors: Tsuyoshi Idé, Rudy Raymond | Published: 2022-08-23 | Updated: 2022-08-24
Privacy Violation
Efficiency of Distributed Learning
Convergence Guarantee

ABL: An original active blacklist based on a modification of the SMTP

Authors: Pablo M. Oliveira, Mateus B. Vieira, Isaac C. Ferreira, João P. R. R. Leite, Edvard M. Oliveira, Bruno T. Kuehne, Edmilson M. Moreira, Otávio A. S. Carpinteiro | Published: 2022-08-22
Spam Prevention
Email Security
Machine Learning

Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models

Authors: Xinlei He, Zheng Li, Weilin Xu, Cory Cornelius, Yang Zhang | Published: 2022-08-22
Poisoning
Membership Inference
Membership Disclosure Risk

An anomaly detection approach for backdoored neural networks: face recognition as a case study

Authors: Alexander Unnervik, Sébastien Marcel | Published: 2022-08-22
Backdoor Attack
Attack Detection
Face Recognition System

Machine Learning with Confidential Computing: A Systematization of Knowledge

Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi | Published: 2022-08-22 | Updated: 2024-06-03
TEE Implementation
Data Protection Method
Membership Inference

Inferring Sensitive Attributes from Model Explanations

Authors: Vasisht Duddu, Antoine Boutet | Published: 2022-08-21 | Updated: 2022-09-07
Privacy Risk Management
Membership Inference
Attack Scenario Analysis