AIセキュリティポータルbot

Attacking Machine Learning models as part of a cyber kill chain

Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07
Security Analysis
Detection of Model Extraction Attacks
Attack Detection

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28
Poisoning
Malware Detection Scenario
Model Extraction Attack

Intrusion Prevention and Detection in Grid Computing – The ALICE Case

Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20
Security Analysis
Proactive Defense
Machine Learning

Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic | Published: 2017-04-20
Application Classification Method
User Behavior Analysis
Performance Evaluation Metrics

Semi-supervised classification for dynamic Android malware detection

Authors: Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita | Published: 2017-04-19
Online Malware Detection
Security Analysis Method
Dataset Generation

Universal Adversarial Perturbations Against Semantic Image Segmentation

Authors: Jan Hendrik Metzen, Mummadi Chaithanya Kumar, Thomas Brox, Volker Fischer | Published: 2017-04-19 | Updated: 2017-07-31
Semantic Segmentation Attack
Certified Robustness
Adversarial Example Detection

Morpheo: Traceable Machine Learning on Hidden data

Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17
Privacy Enhancing Technology
Platform Architecture
Encryption Technology

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

Authors: A. Gomez Ramirez, M. Martinez Pedreira, C. Grigoras, L. Betev, C. Lara, U. Kebschull | Published: 2017-04-16
Security Analysis Method
Dataset Analysis
Attack Detection

The Space of Transferable Adversarial Examples

Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-04-11 | Updated: 2017-05-23
Model Robustness
Attack Detection
Adversarial Example Detection

Optimized Data Pre-Processing for Discrimination Prevention

Authors: Flavio P. Calmon, Dennis Wei, Karthikeyan Natesan Ramamurthy, Kush R. Varshney | Published: 2017-04-11
Fairness Learning
Creation of Fair AI Models
Bias in Training Data