AIセキュリティポータルbot

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

Authors: Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli | Published: 2020-08-17 | Updated: 2021-03-22
Poisoning
Malware Evolution
Membership Inference

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16
Adversarial Example
Machine Learning Technology
Evaluation Method

TextDecepter: Hard Label Black Box Attack on Text Classifiers

Authors: Sachin Saxena | Published: 2020-08-16 | Updated: 2020-12-28
Application of Text Classification
Adversarial Example
Adversarial Training

Adversary Agnostic Robust Deep Reinforcement Learning

Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24
Policy engineering
Adversarial Attack Detection
Machine Learning Method

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13
Watermarking
Code Change Analysis
Security Analysis

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18
Watermarking
Security Analysis
Machine Learning Method

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis

Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13
Poisoning
Evaluation of Explanatory Approaches

Detecting Abnormal Traffic in Large-Scale Networks

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13
Multi-Class Classification
Machine Learning Method
Anomaly Detection Method

WAFFLe: Weight Anonymized Factorization for Federated Learning

Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13
Poisoning
Personalization Method
Machine Learning Method

Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise

Authors: Alex Serban, Erik Poll, Joost Visser | Published: 2020-08-12
Adversarial Example
Adversarial Training
Optimization Problem