AIセキュリティポータルbot

Stealing Machine Learning Models via Prediction APIs

Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart | Published: 2016-09-09 | Updated: 2016-10-03
Model Extraction Attack
モデル抽出攻撃に関連するリスク
Detection of Model Extraction Attacks

Towards Evaluating the Robustness of Neural Networks

Authors: Nicholas Carlini, David Wagner | Published: 2016-08-16 | Updated: 2017-03-22
Model Robustness
Certified Robustness
Adversarial Example

A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation

Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2016-08-08 | Updated: 2016-12-08
Privacy Assurance
Privacy Enhancing Technology
Model evaluation methods

QPass: a Merit-based Evaluation of Soccer Passes

Authors: Laszlo Gyarmati, Rade Stanojevic | Published: 2016-08-08
Core Set Selection Method
Simulation Result Evaluation
Model evaluation methods

Robust High-Dimensional Linear Regression

Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea | Published: 2016-08-07 | Updated: 2016-08-09
Poisoning
Model Robustness
Adversarial Training

Early Methods for Detecting Adversarial Images

Authors: Dan Hendrycks, Kevin Gimpel | Published: 2016-08-01 | Updated: 2017-03-23
Adversarial Example
Adversarial Learning
Adversarial Training

Attribute Learning for Network Intrusion Detection

Authors: Jorge Luis Rivero Pérez, Bernardete Ribeiro | Published: 2016-07-28
Algorithm Design
Methods for Dynamically Identifying New Classes
属性学習

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian | Published: 2016-07-28
Security Analysis Method
Data Extraction and Analysis
Application of Text Classification

Android Malware Detection Using Parallel Machine Learning Classifiers

Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27
API Security
Performance Evaluation
Feature Selection Method

N-opcode Analysis for Android Malware Classification and Categorization

Authors: BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer | Published: 2016-07-27
Dynamic Analysis Framework
Performance Evaluation
Feature Selection Method