AIセキュリティポータルbot

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System

Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07
Malware Detection Method
Information Security
Anomaly Detection Method

Bayesian Hypernetworks

Authors: David Krueger, Chin-Wei Huang, Riashat Islam, Ryan Turner, Alexandre Lacoste, Aaron Courville | Published: 2017-10-13 | Updated: 2018-04-24
Certified Robustness
Model Design
Label

Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries

Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12
Convergence Property
Information Security
Structural Attack

CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions

Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09
Convergence Property
Interpretation Method
Watermark

Age Group and Gender Estimation in the Wild with Deep RoR Architecture

Authors: Ke Zhang, Ce Gao, Liru Guo, Miao Sun, Xingfang Yuan, Tony X. Han, Zhenbing Zhao, Baogang Li | Published: 2017-10-09
Deep Learning Model
Attack that Analyzes Images with AI to Infer Personal Information
Image Processing

Privacy-Preserving Deep Inference for Rich User Data on The Cloud

Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11
Privacy Protection Method
Model Inversion
Facial Recognition Technology

Neural Trojans

Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03
Backdoor Detection
Attack Method
Deep Learning

Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01
Information Security
Information Flow Control
Watermark

Privacy Preserving Identification Using Sparse Approximation with Ambiguization

Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29
Sparse Coding
Privacy Protection
Privacy Protection Method

Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack

Authors: Arash Rahnama, Panos J. Antsaklis | Published: 2017-09-28
Byzantine Consensus Mechanism
Convergence analysis
Anomaly Detection Method