AIセキュリティポータルbot

Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection

Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26
Model Performance Evaluation
Attacker Behavior Analysis
Anomaly Detection Method

Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid

Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25
Privacy Enhancing Technology
Information Security
Anomaly Detection Method

Deep Learning for Secure Mobile Edge Computing

Authors: Yuanfang Chen, Yan Zhang, Sabita Maharjan | Published: 2017-09-23
Malware Detection
Dynamic Analysis Framework
Structural Learning

A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection

Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23
Model Performance Evaluation
Attack Detection
Unknown Attack Detection

Characterizing Diabetes, Diet, Exercise, and Obesity Comments on Twitter

Authors: Amir Karami, Alicia A. Dahl, Gabrielle Turner-McGrievy, Hadi Kharrazi, Jr., George Shaw | Published: 2017-09-22
Data Collection
Data Collection Method
Interpretation of Topic Models

Machine Learning Models that Remember Too Much

Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22
Privacy Protection Mechanism
Privacy Leakage
Model Extraction Attack

Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20
Malware Detection
Model Performance Evaluation
Machine Learning Technology

Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20
Model Extraction Attack
Attack Detection
Machine Learning Technology

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification

Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2017-09-17 | Updated: 2019-12-31
Certified Robustness
Adversarial Learning
Adversarial Example Detection

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14
Backdoor Detection
Model Performance Evaluation
Attack Detection