AIセキュリティポータルbot

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23
Dataset evaluation
Training Data Generation
Feature Extraction Method

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis

Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10
Attack Methods against DFL
Poisoning
Semi-Targeted Attack

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02
Dataset evaluation
Training Data Generation
Hyperparameter Optimization

FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic

Authors: Sankha Das | Published: 2022-03-21
Model Communication
Intrusion Detection System
Generative Adversarial Network

Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap

Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21
Training Data Generation
Analysis of Detection Methods
Machine Learning

RareGAN: Generating Samples for Rare Classes

Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20
Active Learning
Trade-off Analysis
Training Data Generation

The Dark Side: Security Concerns in Machine Learning for EDA

Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20
Training Data Generation
Privacy Risk Management
Malicious Client

On Robust Prefix-Tuning for Text Classification

Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19
XAI (Explainable AI)
Trade-off Analysis
Parameter Tuning

Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18
Privacy Assessment
Risk Assessment Method
Reinforcement Learning Algorithm

Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18
DDoS Attack
Energy-Based Model
Attack Method