AIセキュリティポータルbot

Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05
Privacy Protection
Poisoning
Defense Method

Best Subset Selection with Efficient Primal-Dual Algorithm

Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05
Algorithm Design
Optimization Problem
Feature Selection Method

Defending against the Label-flipping Attack in Federated Learning

Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05
Algorithm Design
Poisoning
Defense Method

Federated Split GANs

Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft | Published: 2022-07-04
Privacy Protection
Efficiency of Distributed Learning
Challenges of Generative Models

Machine Learning in Access Control: A Taxonomy and Survey

Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu | Published: 2022-07-04
Dynamic Access Control
Machine Learning Application
Feature Selection Method

Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate

Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu | Published: 2022-07-04
Review and Investigation
Information Gathering Methods
Deception Detection

High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09
Algorithm Design
Convergence Guarantee
Selection and Evaluation of Optimization Algorithms

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
Network Slicing
Risk Assessment Method
Adversarial Learning

Cybersecurity: Past, Present and Future

Authors: Shahid Alam | Published: 2022-07-04 | Updated: 2024-03-03
Storage Device
Digital Forensics
Malware Detection

Ransomware Classification and Detection With Machine Learning Algorithms

Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02
Backdoor Attack
Dynamic Analysis
Evaluation Method