AIセキュリティポータルbot

Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent

Authors: Yudong Chen, Lili Su, Jiaming Xu | Published: 2017-05-16 | Updated: 2017-10-23
Model Performance Evaluation
Robustness
Distributed Learning

Extending Defensive Distillation

Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15
Robustness
Adversarial Example
Defense Method

Musical Instrument Recognition Using Their Distinctive Characteristics in Artificial Neural Networks

Authors: Babak Toghiani-Rizi, Marcus Windmark | Published: 2017-05-14
Dataset evaluation
Feature Extraction Method
Speech Enhancement Technology

PerfWeb: How to Violate Web Privacy with Hardware Performance Events

Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12
Performance Evaluation
Model Performance Evaluation
User Activity Analysis

Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter

Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali | Published: 2017-05-09
Spam User Detection
User Activity Analysis
Sentiment Analysis

Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2017-05-08
Model Robustness
Certified Robustness
Defense Mechanism

Attacking Machine Learning models as part of a cyber kill chain

Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07
Security Analysis
Detection of Model Extraction Attacks
Attack Detection

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28
Poisoning
Malware Detection Scenario
Model Extraction Attack

Intrusion Prevention and Detection in Grid Computing – The ALICE Case

Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20
Security Analysis
Proactive Defense
Machine Learning

Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic | Published: 2017-04-20
Application Classification Method
User Behavior Analysis
Performance Evaluation Metrics