AIセキュリティポータルbot

The Crossover Process: Learnability and Data Protection from Inference Attacks

Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07
Model Evaluation
Convergence Property
因果推論

Curie: A method for protecting SVM Classifier from Poisoning Attack

Authors: Ricky Laishram, Vir Virander Phoha | Published: 2016-06-05 | Updated: 2016-06-07
Model Evaluation
Adversarial Attack Detection
Detection of Poisonous Data

Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends

Authors: Alexy Bhowmick, Shyamanta M. Hazarika | Published: 2016-06-03
スパム進化
Feature Extraction
Feature Extraction Method

SUIS: An Online Graphical Signature-Based User Identification System

Authors: Shahid Alam | Published: 2016-05-29
Integration of Digital Signatures and Machine Learning
Model Performance Evaluation
User Identification System

Data-driven software security: Models and methods

Authors: Úlfar Erlingsson | Published: 2016-05-27
Security Assurance
Privacy Protection Mechanism
Vulnerability Management

Deep Structured Energy Based Models for Anomaly Detection

Authors: Shuangfei Zhai, Yu Cheng, Weining Lu, Zhongfei Zhang | Published: 2016-05-25 | Updated: 2016-06-16
Identification of AI Output
Model Performance Evaluation
Model Design

A note on privacy preserving iteratively reweighted least squares

Authors: Mijung Park, Max Welling | Published: 2016-05-24
Privacy Protection Mechanism
Privacy-Preserving Machine Learning
Differential Privacy

Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow | Published: 2016-05-24
Certified Robustness
Adversarial Example
Adversarial Attack Analysis

A First Look at Ad-block Detection: A New Arms Race on the Web

Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui | Published: 2016-05-19
URL-based Detection
Data Collection
Feature Importance Analysis

On-Average KL-Privacy and its equivalence to Generalization for Max-Entropy Mechanisms

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2016-05-08
Privacy Protection Mechanism
Differential Privacy
情報理論