AIセキュリティポータルbot

AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning

Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-05-13 | Updated: 2020-04-13
Privacy Protection Mechanism
Membership Inference
Loss Function

Curriculum Adversarial Training

Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13
Data Curation
Model Robustness
Adversarial Learning

Under the Underground: Predicting Private Interactions in Underground Forums

Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11
Darknet Analysis
Membership Inference
User Behavior Analysis

Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks

Authors: Amara Dinesh Kumar | Published: 2018-05-11
Data Preprocessing
Performance Evaluation Metrics
Deep Learning Model

Exploiting Unintended Feature Leakage in Collaborative Learning

Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01
Data Leakage
Membership Inference
Label Inference Attack

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09
Cybersecurity
Information Security
Attack Detection

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07
Cybersecurity
Information Security
Deep Learning Model

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12
Cybersecurity
Attack Detection
Robustness of Watermarking Techniques

PRADA: Protecting against DNN Model Stealing Attacks

Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31
Data Generation
Model Extraction Attack
Threat Model

Automatic Classification of Object Code Using Machine Learning

Authors: John Clemens | Published: 2018-05-06
Data-Driven Vulnerability Assessment
Program Analysis
Information Security