AIセキュリティポータルbot

Maximum Principle Based Algorithms for Deep Learning

Authors: Qianxiao Li, Long Chen, Cheng Tai, Weinan E | Published: 2017-10-26 | Updated: 2018-06-02
Model Design
Convergence Property
Multi-Objective Optimization

Malware Detection by Eating a Whole EXE

Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25
Malware Classification
Malware Detection Method
Model Design

One pixel attack for fooling deep neural networks

Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17
Adversarial Example
Adversarial Example Detection
Structural Attack

Human-in-the-loop Artificial Intelligence

Authors: Fabio Massimo Zanzotto | Published: 2017-10-23
Algorithm Fairness
Human-in-the-Loop
Artificial Intelligence Regulation

Survey of Machine Learning Techniques for Malware Analysis

Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni | Published: 2017-10-23 | Updated: 2018-11-26
Malware Detection Method
Dynamic Analysis
Analysis of Detection Methods

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22
Data Collection Method
Feature Selection
Authentication Technology

Elliptical modeling and pattern analysis for perturbation models and classfication

Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22
Data Privacy Assessment
Privacy-Preserving Machine Learning
Model evaluation methods

A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity

Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03
Model evaluation methods
Convergence Property
Definition of Mathematical Concepts

Solving the “false positives” problem in fraud prediction

Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20
Data Extraction and Analysis
Model evaluation methods
evaluation metrics

Learning Differentially Private Recurrent Language Models

Authors: H. Brendan McMahan, Daniel Ramage, Kunal Talwar, Li Zhang | Published: 2017-10-18 | Updated: 2018-02-24
Privacy-Preserving Machine Learning
Differential Privacy
Deep Learning