AIセキュリティポータルbot

High Accuracy and High Fidelity Extraction of Neural Networks

Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03
Model Extraction Attack
Model Evaluation
Adversarial Example

Metric Learning for Adversarial Robustness

Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28
Poisoning
Improvement of Learning
Vulnerability of Adversarial Examples

Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15
Future Research
Machine Learning Algorithm
Feature Selection Method

Your Smart Home Can’t Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

Authors: Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang | Published: 2019-08-31
IoT Traffic Analysis
Privacy Protection Mechanism
Feature Selection Method

IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

Authors: Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra | Published: 2019-08-30 | Updated: 2019-09-09
Sensor Information Management
Data Collection
Blockchain

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13
Poisoning
Adversarial Example
Adversarial Attack Detection

White-box vs Black-box: Bayes Optimal Strategies for Membership Inference

Authors: Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou | Published: 2019-08-29
Sample Complexity
Membership Inference
Difficulty Calibration

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29
Robustness Verification Method
Adversarial Example
Machine Learning Application

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis

Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15
Text Extraction Method
Information Extraction
Machine Learning Algorithm

Fairness-Aware Process Mining

Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28
Data Collection
Feature Extraction Method
Measurement of Observational Fairness