AIセキュリティポータルbot

On the Adversarial Robustness of Subspace Learning

Authors: Fuwei Li, Lifeng Lai, Shuguang Cui | Published: 2019-08-17
Definition of Mathematical Concepts
Adversarial Attack Methods
Optimization Problem

Adversarial shape perturbations on 3D point clouds

Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

The Next 700 Policy Miners: A Universal Method for Building Policy Miners

Authors: Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin | Published: 2019-08-16 | Updated: 2019-08-27
Policy Mining
General-Purpose Policy Mining Methods
Probability distribution

FSGAN: Subject Agnostic Face Swapping and Reenactment

Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16
Data Generation Method
Deepfake
Model Evaluation

Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences

Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15
Data Collection
Efficiency Evaluation
Feature Engineering

Side-Channel Aware Fuzzing

Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14
Future Research
Feature Engineering
Evaluation Method

Interpretable Encrypted Searchable Neural Networks

Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14
Privacy Enhancing Technology
Cryptography
Computational Complexity

Trustable and Automated Machine Learning Running with Blockchain and Its Applications

Authors: Tao Wang, Xinmin Wu, Taiping He | Published: 2019-08-14
Smart Contract
Blockchain
Crime Detection

On Defending Against Label Flipping Attacks on Malware Detection Systems

Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16
Poisoning
Adversarial Attack Methods
Computational Complexity

Automatic Model Monitoring for Data Streams

Authors: Fábio Pinto, Marco O. P. Sampaio, Pedro Bizarro | Published: 2019-08-12
Online Learning
Time Window Analysis
Automated Model Monitoring