AIセキュリティポータルbot

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28
Adversarial Attack Methods
Optimization Problem
Computational Efficiency

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11
Data Extraction and Analysis
Attacker Behavior Analysis
Machine Learning Framework

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11
Machine Learning Technology
Decision Tree
Evaluation Method

Towards Plausible Differentially Private ADMM Based Distributed Machine Learning

Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11
Privacy Protection Method
Optimization Problem
Computational Efficiency

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks

Authors: Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-08-11 | Updated: 2020-12-09
Group-Based Robustness
Backdoor Attack
Poisoning Attack

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10
Data Extraction and Analysis
Machine Learning Framework
Vulnerability Management

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10
Poisoning Attack
Machine Learning Framework
Communication Efficiency

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09
Data Extraction and Analysis
Privacy Management
Computational Efficiency

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09
Performance Evaluation Metrics
Attack Detection
Machine Learning Application