AIセキュリティポータルbot

Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach

Authors: Parker Lamb, Alexander Millar, Ramon Fuentes | Published: 2020-07-27 | Updated: 2020-10-13
Bayesian Classification
Changes in User Behavior
Machine Learning

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15
Intrusion Detection System
Performance Evaluation
Computational Efficiency

Feature importance in mobile malware detection

Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28
Dataset Analysis
Malware Detection Method
Feature Importance Analysis

Evaluation of Federated Learning in Phishing Email Detection

Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21
Privacy Assessment
Performance Evaluation
Deep Learning

Detecting malicious PDF using CNN

Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02
Online Malware Detection
Performance Evaluation
Deep Learning

Provably Robust Adversarial Examples

Authors: Dimitar I. Dimitrov, Gagandeep Singh, Timon Gehr, Martin Vechev | Published: 2020-07-23 | Updated: 2022-03-17
Performance Evaluation
Adversarial Example
Deep Learning

Hide-and-Seek Privacy Challenge

Authors: James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, Mihaela van der Schaar | Published: 2020-07-23 | Updated: 2020-07-24
Privacy Assessment
Performance Evaluation
Generative Model Characteristics

Private Post-GAN Boosting

Authors: Marcel Neunhoeffer, Zhiwei Steven Wu, Cynthia Dwork | Published: 2020-07-23 | Updated: 2021-03-25
Game Theory
Privacy Assessment
Performance Evaluation

Robust Machine Learning via Privacy/Rate-Distortion Theory

Authors: Ye Wang, Shuchin Aeron, Adnan Siraj Rakin, Toshiaki Koike-Akino, Pierre Moulin | Published: 2020-07-22 | Updated: 2021-05-18
Privacy Assessment
Optimization Problem
Defense Mechanism

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim | Published: 2020-07-21 | Updated: 2020-08-02
Backdoor Attack
Poisoning
Attack Method