AIセキュリティポータルbot

Adversarial Frontier Stitching for Remote Neural Network Watermarking

Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07
Adversarial Example
Adversarial Learning
Watermark Design

Computer activity learning from system call time series

Authors: Curt Hastings, Ronnie Mainieri | Published: 2017-11-06
Clustering methods
Trigger Detection
Malware Detection Method

Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures

Authors: Anisa Halimi, Erman Ayday | Published: 2017-11-06
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Privacy Assessment
Profile Matching Attack

Towards Reverse-Engineering Black-Box Neural Networks

Authors: Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz | Published: 2017-11-06 | Updated: 2018-02-14
Backdoor Detection
Membership Inference
Model Extraction Attack

Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification

Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05
Privacy-Preserving Machine Learning
Model Performance Evaluation
Biometric Key Generation

Implicit Weight Uncertainty in Neural Networks

Authors: Nick Pawlowski, Andrew Brock, Matthew C. H. Lee, Martin Rajchl, Ben Glocker | Published: 2017-11-03 | Updated: 2018-05-25
Robustness
Adversarial Learning
Machine Learning

SPARK: Static Program Analysis Reasoning and Retrieving Knowledge

Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03
Security Analysis Method
Machine Learning
Knowledge Extraction Method

Provable defenses against adversarial examples via the convex outer adversarial polytope

Authors: Eric Wong, J. Zico Kolter | Published: 2017-11-02 | Updated: 2018-06-08
Certified Robustness
Robustness
Deep Learning Technology

BinPro: A Tool for Binary Source Code Provenance

Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02
Machine Learning
Watermarking Technology
Similarity Measurement

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01
Security Information Management
Machine Learning
Watermarking Technology