AIセキュリティポータルbot

Multi-task Learning and Catastrophic Forgetting in Continual Reinforcement Learning

Authors: João Ribeiro, Francisco S. Melo, João Dias | Published: 2019-09-22
Reinforcement Learning Attack
Machine Learning Application
Machine Learning Technology

Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data

Authors: Evan Brinckman, Andrey Kuehlkamp, Jarek Nabrzyski, Ian J. Taylor | Published: 2019-09-22
Smart Contract
Data Collection
Blockchain Economics

Dynamic data fusion using multi-input models for malware classification

Authors: Viktor Zenkov, Jason Laska | Published: 2019-09-21
Data Collection
Model Design and Accuracy
Machine Learning Algorithm

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21
Privacy Protection Mechanism
Information Security
Machine Learning Application

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20
Poisoning
Adversarial Example
Adversarial attack

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14
Poisoning
Taxonomy of Attacks
Adversarial attack

Towards Federated Graph Learning for Collaborative Financial Crimes Detection

Authors: Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran | Published: 2019-09-19 | Updated: 2019-10-02
Graph Representation Learning
Risk Management
Machine Learning Application

Synthesis of Realistic ECG using Generative Adversarial Networks

Authors: Anne Marie Delaney, Eoin Brophy, Tomas E. Ward | Published: 2019-09-19
Signal Analysis
Machine Learning Technology
Generative Adversarial Network

Adversarial Vulnerability Bounds for Gaussian Process Classification

Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19
Taxonomy of Attacks
Adversarial Example
Machine Learning Technology

Differentially Private Regression and Classification with Sparse Gaussian Processes

Authors: Michael Thomas Smith, Mauricio A. Alvarez, Neil D. Lawrence | Published: 2019-09-19
Privacy Protection Mechanism
Privacy Classification
Machine Learning Technology