AIセキュリティポータルbot

Android Malware Detection: an Eigenspace Analysis Approach

Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27
Data Extraction and Analysis
Model evaluation methods
Feature Selection Method

Wavelet decomposition of software entropy reveals symptoms of malicious code

Authors: Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao | Published: 2016-07-18 | Updated: 2018-02-02
Energy Management
Model evaluation methods
Feature Selection Method

Adversarial examples in the physical world

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-07-08 | Updated: 2017-02-11
Certified Robustness
Adversarial Example
Adversarial Transferability

Deciphering Malware’s use of TLS (without Decryption)

Authors: Blake Anderson, Subharthi Paul, David McGrew | Published: 2016-07-06
TLSクライアント構成
Secure Communication Channel
Data Extraction and Analysis

Bayesian Nonparametrics for Sparse Dynamic Networks

Authors: Cian Naik, Francois Caron, Judith Rousseau, Yee Whye Teh, Konstantina Palla | Published: 2016-07-06 | Updated: 2022-04-14
Dynamic Analysis
Convergence Property
Time Series Analysis

Deep Learning with Differential Privacy

Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2016-07-01 | Updated: 2016-10-24
Privacy-Preserving Machine Learning
Differential Privacy
Deep Learning

Adaptive and Scalable Android Malware Detection through Online Learning

Authors: Annamalai Narayanan, Liu Yang, Lihui Chen, Liu Jinliang | Published: 2016-06-23 | Updated: 2016-09-26
Online Learning
Security Analysis
Adaptive Misuse Detection

Efficient Attack Graph Analysis through Approximate Inference

Authors: Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu | Published: 2016-06-22
Bayesian Security
Risk Analysis Method
Dynamic Analysis

An effective approach for classification of advanced malware with high accuracy

Authors: Ashu Sharma, Sanjay K. Sahay | Published: 2016-06-22
Network Threat Detection
Model Evaluation
Feature Selection

Adversarial Perturbations Against Deep Neural Networks for Malware Classification

Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel | Published: 2016-06-14 | Updated: 2016-06-16
Certified Robustness
Adversarial Example
Adversarial Attack Assessment