AIセキュリティポータルbot

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12
Malware Detection
Adversarial Example
Deep Learning Method

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12
Performance Evaluation
Adversarial Attack Methods
Deep Learning Method

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11
Federated Learning
Weight Update Method
Defense Effectiveness Analysis

Bayesian Estimation of Differential Privacy

Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15
Privacy Assessment
Bayesian Security
Deep Learning Method

Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging

Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11
Graph Construction
Privacy Assessment
Communication Model

Deep Leakage from Model in Federated Learning

Authors: Zihao Zhao, Mengen Luo, Wenbo Ding | Published: 2022-06-10
Attack Methods against DFL
Poisoning
Federated Learning

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10
Attack Methods against DFL
Membership Inference
Adversarial Attack Methods

Leveraging Centric Data Federated Learning Using Blockchain For Integrity Assurance

Authors: Riadh Ben Chaabene, Darine Amayed, Mohamed Cheriet | Published: 2022-06-09
Smart Contract
Federated Learning

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05
Privacy Assessment
Impact of Generalization
Adversarial Example

GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

Authors: Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song | Published: 2022-06-09 | Updated: 2022-06-29
Robustness
Impact of Generalization
Deep Learning Method