AIセキュリティポータルbot

Approximate Data Deletion in Generative Models

Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29
Algorithm Design
Data Leakage
Hypothesis Testing

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model

Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29
DNN IP Protection Method
Algorithm Design
Membership Inference

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection

CoAP-DoS: An IoT Network Intrusion Dataset

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29
DoS Attack
IoMT Security
Network Threat Detection

How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection

Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28
Algorithm Design
Adversarial Example
Computational Efficiency

Parallel Instance Filtering for Malware Detection

Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28
Algorithm Design
Computational Efficiency
Static Analysis

Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs

Authors: Chang Sun, Johan van Soest, Michel Dumontier | Published: 2022-06-28
Attribute Disclosure Risk
Information-Theoretic Privacy
Generative Adversarial Network

Multifamily Malware Models

Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27
Algorithm Design
Malware Propagation Means
Evaluation Method

Adversarially Robust PAC Learnability of Real-Valued Functions

Authors: Idan Attias, Steve Hanneke | Published: 2022-06-26 | Updated: 2024-05-05
Algorithm Design
Sampling Method
Improvement of Learning

Malware Detection and Prevention using Artificial Intelligence Techniques

Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26
Network Threat Detection
Malicious Package Detection
Static Analysis