AIセキュリティポータルbot

Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection

Authors: João Vitorino, Nuno Oliveira, Isabel Praça | Published: 2022-03-08 | Updated: 2022-03-29
DDoS Attack
Data Generation
Robustness Evaluation

LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data

Authors: Lianlian Jiang, Yuexuan Wang, Wenyi Zheng, Chao Jin, Zengxiang Li, Sin G. Teo | Published: 2022-03-08
Privacy Protection Mechanism
Framework
Computational Complexity

Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation

Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08
Data Generation
Robustness Evaluation
Defense Method

ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15
Dataset Generation
Robustness Evaluation
Optimization Strategy

Vulnerability Detection in Open Source Software: An Introduction

Authors: Stuart Millar | Published: 2022-03-06
Dynamic Analysis
Vulnerability detection
Static Analysis

Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05
Graph Representation Learning
Data Generation
Framework

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18
Dataset Generation
Data Generation
Model Performance Evaluation

Training language models to follow instructions with human feedback

Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04
Alignment
User Behavior Analysis
Performance Evaluation

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12
Malware Classification
Adversarial Example
Defense Method

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04
Backdoor Attack
Model Architecture