AIセキュリティポータルbot

Enhancing Robustness of Machine Learning Systems via Data Transformations

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal | Published: 2017-04-09 | Updated: 2017-11-29
Certified Robustness
Model Extraction Attack
Defense Effectiveness Analysis

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-04-06 | Updated: 2017-04-08
Security Analysis Method
Program Analysis
Malware Detection Method

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks

Authors: Yi Han, Benjamin I. P. Rubinstein | Published: 2017-04-06 | Updated: 2017-05-25
Poisoning
Certified Robustness
Adversarial Learning

Comment on “Biologically inspired protection of deep networks from adversarial attacks”

Authors: Wieland Brendel, Matthias Bethge | Published: 2017-04-05
Trigger Detection
Certified Robustness
Adversarial Learning

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2017-03-31
Online Malware Detection
Dynamic Analysis Method
Performance Evaluation Method

Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks

Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24
Data Generation
Deepfake
Image Processing

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28
IoT Security Issues
Security Analysis Method
Attack Method

Adversarial Source Identification Game with Corrupted Training

Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27
Security Analysis
Strategic Game
Attack Pattern Extraction

Biologically inspired protection of deep networks from adversarial attacks

Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27
Model Design and Accuracy
Certified Robustness
Improvement of Learning

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23
Performance Evaluation
Attack Pattern Extraction
Adversarial Example