AIセキュリティポータルbot

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

Authors: Runhua Xu, James Joshi, Chao Li | Published: 2020-12-18 | Updated: 2021-04-18
Data Protection Method
Training Data Extraction Method
Encryption Protocol

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31
Backdoor Attack
Poisoning
Model Protection Methods

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
Watermarking
Dataset evaluation
Training Data Extraction Method

Learning from History for Byzantine Robust Optimization

Authors: Sai Praneeth Karimireddy, Lie He, Martin Jaggi | Published: 2020-12-18 | Updated: 2021-06-29
Byzantine Consensus Mechanism
Dynamic Byzantine Behavior
Weight Update Method

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21
Dataset evaluation
Attack Detection
Role of Machine Learning

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16
ML-Based IDS
Machine Learning Application
Complexity of the Environment

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16
DDoS Attack
Machine Learning Application
Defense Method

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16
User Behavior Analysis
Attack Detection
Role of Machine Learning

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16
Taxonomy of Attacks
Adversarial Attack Methods
Role of Machine Learning