AIセキュリティポータルbot

Malware Analysis with Symbolic Execution and Graph Kernel

Authors: Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-12
Algorithm Design
Graph Kernel
Machine Learning Application

Scalable privacy-preserving cancer type prediction with homomorphic encryption

Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12
Privacy Protection
Matrix Multiplication Methods
evaluation metrics

SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges

Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02
Watermarking
Privacy Protection
Privacy Protection in Machine Learning

Stability and Generalization of Differentially Private Minimax Problems

Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22
Privacy Protection
Generalization Performance
Loss Function

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11
Security Analysis
Data Collection
Deep Transfer Learning

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05
Algorithm Design
Data Extraction and Analysis
evaluation metrics

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08
Trojan Horse Signature
Trojan Detection
Backdoor Attack

HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08
Smart Contract
Privacy Protection
Distributed Learning

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07
Security Analysis
Hardware Security
Quantum Machine Learning

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17
Characteristics of APT Attacks
Security Analysis
Anomaly Detection Method