AIセキュリティポータルbot

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04
Machine Learning
Deep Learning
Anomaly Detection Algorithm

ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare

Authors: Ali Burak Ünal, Mete Akgün, Nico Pfeifer | Published: 2020-12-04
Security Analysis
Framework
Privacy Protection in Machine Learning

Unleashing the Tiger: Inference Attacks on Split Learning

Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi | Published: 2020-12-04 | Updated: 2021-11-04
Membership Inference
Attack Method
Privacy Protection in Machine Learning

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
Content Moderation
Security Analysis
Adversarial Learning

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09
Attack Method
Adversarial Example
Adversarial Learning

SSGD: A safe and efficient method of gradient descent

Authors: Jinhuan Duan, Xianxian Li, Shiqi Gao, Jinyan Wang, Zili Zhong | Published: 2020-12-03 | Updated: 2021-04-26
Parameter Tuning
Optimization Methods
Privacy Protection in Machine Learning

FAT: Federated Adversarial Training

Authors: Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Beat Buesser | Published: 2020-12-03
Backdoor Attack
Poisoning
Adversarial Training

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14
Machine Learning
Anomaly Detection Method
Communication Efficiency

A Chatbot for Information Security

Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01
Abuse of AI Chatbots
Advice Provision
Information Security

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02
Data Collection
Feature Extraction Method
Vulnerability detection