AIセキュリティポータルbot

Fed-FSNet: Mitigating Non-I.I.D. Federated Learning via Fuzzy Synthesizing Network

Authors: Jingcai Guo, Song Guo, Jie Zhang, Ziming Liu | Published: 2022-08-21 | Updated: 2023-04-25
Poisoning
Efficiency of Distributed Learning
Machine Learning Technology

Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning

Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2022-08-21 | Updated: 2024-01-01
Byzantine Resilience
Poisoning
Attack Detection

A Review of Federated Learning in Energy Systems

Authors: Xu Cheng, Chendan Li, Xiufeng Liu | Published: 2022-08-20
Privacy Violation
Efficiency of Distributed Learning
Machine Learning

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak | Published: 2022-08-20 | Updated: 2022-10-30
Training Protocol
Attack Detection
Machine Learning Technology

Challenges and Complexities in Machine Learning based Credit Card Fraud Detection

Authors: Gayan K. Kulatilleke | Published: 2022-08-20
Data Origins and Evolution
Fraudulent Transaction
Machine Learning

Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures

Authors: Sudeep Pasricha, John Jose, Sujay Deb | Published: 2022-08-18
DoS Mitigation
Malicious Node Detection
Attack Detection

Mouse Dynamics Behavioral Biometrics: A Survey

Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01
User Activity Analysis
User Authentication System
User Behavior Analysis

Profiler: Profile-Based Model to Detect Phishing Emails

Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18
Phishing Attack
Detection Rate of Phishing Attacks
Machine Learning Technology

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han | Published: 2022-08-18
Training Protocol
Privacy Risk Management
Communication Efficiency

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17
Data Protection Method
Poisoning
Attack Detection