AIセキュリティポータルbot

AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks

Authors: Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili | Published: 2022-03-18
DDoS Attack
IoT Cybersecurity
Intrusion Detection System

Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network

Authors: Hai N. Nguyen, Guevara Noubir | Published: 2022-03-18
Performance Evaluation
Wireless Channel Detection
Communication Model

Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study

Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17
Data Management System
Performance Evaluation
Machine Learning Algorithm

SoK: Differential Privacy on Graph-Structured Data

Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17
Graph Privacy
Privacy Protection
Privacy Analysis

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16
Dataset evaluation
Vulnerability Attack Method
Evaluation Method

Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling

Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15
Dataset evaluation
Privacy Enhancing Technology
Semi-Supervised Learning

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17
Dataset evaluation
Performance Evaluation Metrics
Feature Selection Method

A Framework for Verifiable and Auditable Federated Anomaly Detection

Authors: Gabriele Santin, Inna Skarbovsky, Fabiana Fournier, Bruno Lepri | Published: 2022-03-15
Training Protocol
Privacy Enhancing Technology
Blockchain Integration

SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data

Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke | Published: 2022-03-15
Model Selection Method
Performance Evaluation Metrics
Threat Intelligence

RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14
Poisoning
Vulnerability Attack Method
Defense Method