AIセキュリティポータルbot

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03
Data Extraction and Analysis
Device Identification Method
Resource Usage Analysis

Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification

Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17
Uncertainty Assessment
Adversarial Attack Methods
Deep Learning Method

Optimizing Information Loss Towards Robust Neural Networks

Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29
Information-Theoretic Approach
Adversarial Example
Adversarial Attack Methods

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification

Authors: Wenjun Qiu, David Lie | Published: 2020-08-07
Active Learning
Data Extraction and Analysis
Privacy Assessment

Stronger and Faster Wasserstein Adversarial Attacks

Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06
Watermarking
Adversarial Learning
Adversarial attack

New Directions in Automated Traffic Analysis

Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19
Watermarking
Data Extraction and Analysis
Machine Learning

Data Minimization for GDPR Compliance in Machine Learning Models

Authors: Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash | Published: 2020-08-06
Data Obfuscation
Data Extraction and Analysis
Role of Machine Learning

Training DNN Model with Secret Key for Model Protection

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06
Watermarking
Adversarial Learning
Machine Learning

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05
Attack Detection
Machine Learning
Anomaly Detection Method

Robust Deep Reinforcement Learning through Adversarial Loss

Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10
Poisoning
Reinforcement Learning
Adversarial Example