AIセキュリティポータルbot

IoT Security Techniques Based on Machine Learning

Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19
IoT Security
Reinforcement Learning Method
Machine Learning Technology

Blind De-anonymization Attacks using Social Networks

Authors: Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee | Published: 2018-01-17
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Graph Representation Learning
Privacy-Preserving Machine Learning

Gazelle: A Low Latency Framework for Secure Neural Network Inference

Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16
Secure Arithmetic Computation
Encryption Technology
Watermarking Technology

Sparsity-based Defense against Adversarial Attacks on Linear Classifiers

Authors: Zhinus Marzi, Soorya Gopalakrishnan, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-01-15 | Updated: 2018-06-19
Sparsity Defense
Adversarial Learning
Adversarial attack

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

Authors: Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu | Published: 2018-01-15
Robustness Improvement Method
Adversarial Example
Adversarial Attack Detection

A3T: Adversarially Augmented Adversarial Training

Authors: Akram Erraqabi, Aristide Baratin, Yoshua Bengio, Simon Lacoste-Julien | Published: 2018-01-12
Certified Robustness
Robustness Improvement Method
Adversarial Attack Detection

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks

Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Fusion of ANN and SVM Classifiers for Network Attack Detection

Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10
ML-Based IDS
Data Preprocessing
Machine Learning Method

Spatially Transformed Adversarial Examples

Authors: Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2018-01-09
Robustness Improvement Method
Adversarial Learning
Adversarial Attack Detection

Generating Adversarial Examples with Adversarial Networks

Authors: Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2019-02-14
Adversarial Example
Adversarial Learning
Adversarial Attack Detection