AIセキュリティポータルbot

A Review of Computer Vision Methods in Network Security

Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne | Published: 2020-05-07
Malware Classification
Analysis of Detection Methods
Feature Extraction Method

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Towards Frequency-Based Explanation for Robust CNN

Authors: Zifan Wang, Yilin Yang, Ankit Shrivastava, Varun Rawal, Zihao Ding | Published: 2020-05-06
Robustness Improvement Method
Frequency Component Analysis
Adversarial Example

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06
Algorithm
Robustness Improvement Method
Adversarial Attack Detection

Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning

Authors: Semih Yagli, Alex Dytso, H. Vincent Poor | Published: 2020-05-05
Privacy Assessment
Privacy Protection in Machine Learning
Federated Learning System

Adversarial Training against Location-Optimized Adversarial Patches

Authors: Sukrut Rao, David Stutz, Bernt Schiele | Published: 2020-05-05 | Updated: 2020-12-14
Robustness Improvement Method
Adversarial Example
Optimization Strategy

When Machine Unlearning Jeopardizes Privacy

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-05-05 | Updated: 2021-09-14
Poisoning
Membership Inference
Privacy Protection in Machine Learning

Stealing Links from Graph Neural Networks

Authors: Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang | Published: 2020-05-05 | Updated: 2020-10-05
Model Inversion
Link Prediction Method
Attack Evaluation

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04
Poisoning
Malware Classification
Role of Machine Learning