AIセキュリティポータルbot

Simple Black-Box Adversarial Perturbations for Deep Networks

Authors: Nina Narodytska, Shiva Prasad Kasiviswanathan | Published: 2016-12-19
Adversarial Example
Adversarial Attack Methods
Image Classification Method

Simple and Scalable Predictive Uncertainty Estimation using Deep Ensembles

Authors: Balaji Lakshminarayanan, Alexander Pritzel, Charles Blundell | Published: 2016-12-05 | Updated: 2017-11-04
Quantification of Uncertainty
Performance Evaluation Metrics
Deep Learning Method

N-gram Opcode Analysis for Android Malware Detection

Authors: BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin | Published: 2016-12-05
Dataset Analysis
Binary Classifier
Feature Selection Method

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions

Authors: Anupama Aggarwal, Bimal Viswanath, Saravana Kumar, Ayush Shah, Liang Zhang, Ponnurangam Kumaraguru | Published: 2016-12-02 | Updated: 2018-05-03
API Security
スパイ拡張検出
Privacy Analysis

A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples

Authors: Beilun Wang, Ji Gao, Yanjun Qi | Published: 2016-12-01 | Updated: 2017-09-27
Adversarial Learning
Feature Importance Analysis
Defense Method

Combining Deep Reinforcement Learning and Safety Based Control for Autonomous Driving

Authors: Xi Xiong, Jianqiang Wang, Fang Zhang, Keqiang Li | Published: 2016-12-01
フェールセーフ機構
Reinforcement Learning Algorithm
Deep Learning Method

Hierarchical Online Intrusion Detection for SCADA Networks

Authors: Hongrui Wang, Tao Lu, Xiaodai Dong, Peixue Li, Michael Xie | Published: 2016-11-28
Security Information Management
Feature Importance Analysis
Defense Method

“Influence Sketching”: Finding Influential Samples In Large-Scale Regressions

Authors: Mike Wojnowicz, Ben Cruz, Xuan Zhao, Brian Wallace, Matt Wolff, Jay Luan, Caleb Crable | Published: 2016-11-17 | Updated: 2017-03-23
Data Curation
Model Identification
High-Dimensional Data Analysis

AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack

Authors: Igino Corona, Battista Biggio, Davide Maiorca | Published: 2016-11-15
Misuse of Security API
Privacy Protection
Poisoning

Practical Secure Aggregation for Federated Learning on User-Held Data

Authors: Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth | Published: 2016-11-14
Secure Aggregation
Privacy-Preserving Machine Learning
Federated Learning