AIセキュリティポータルbot

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13
Transaction Prioritization
Privacy Assessment
Fraudulent Transaction

Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami | Published: 2020-05-28
Energy Management
Privacy Assessment
Dynamic Pricing

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28
Performance Evaluation
Privacy Assessment
Machine Learning

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18
Adversarial Example
Adversarial attack
Machine Learning Technology

Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries

Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27
Training Data Generation
Adversarial Example
Defense Effectiveness Analysis

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27
Algorithm
Machine Learning
Machine Learning Technology

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27
Adversarial attack
Machine Learning Technology
Communication Loss

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27
Algorithm
Attack Evaluation
Optimization Methods

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology