AIセキュリティポータルbot

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan | Published: 2015-12-28 | Updated: 2017-12-18
Digital Forensics
Privacy Risk Management
Model Performance Evaluation

Using Data Analytics to Detect Anomalous States in Vehicles

Authors: Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi | Published: 2015-12-25
Data Collection
Model Performance Evaluation
Model Design

Deep-Spying: Spying using Smartwatch and Deep Learning

Authors: Tony Beltramelli, Sebastian Risi | Published: 2015-12-17
Data Collection
Model Performance Evaluation
Deep Learning

A machine learning approach to anomaly-based detection on Android platforms

Authors: Joshua Abah, Waziri O. V, Abdullahi M. B, Arthur U. M, Adewale O. S | Published: 2015-12-13
Data Collection
Malware Detection
Model Performance Evaluation

Where You Are Is Who You Are: User Identification by Matching Statistics

Authors: Farid M. Naini, Jayakrishnan Unnikrishnan, Patrick Thiran, Martin Vetterli | Published: 2015-12-09
Data Collection
Privacy Risk Management
Privacy Protection Mechanism

Explaining reviews and ratings with PACO: Poisson Additive Co-Clustering

Authors: Chao-Yuan Wu, Alex Beutel, Amr Ahmed, Alexander J. Smola | Published: 2015-12-06
Clustering methods
Model Design
Convergence Analysis

The Limitations of Deep Learning in Adversarial Settings

Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami | Published: 2015-11-24
Adversarial Example
Adversarial Example Detection
Deep Learning Model

Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks

Authors: Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, Ananthram Swami | Published: 2015-11-14 | Updated: 2016-03-14
Certified Robustness
Adversarial Example
Deep Learning

$k$-means: Fighting against Degeneracy in Sequential Monte Carlo with an Application to Tracking

Authors: Kai Fan, Katherine Heller | Published: 2015-11-13
Clustering methods
Simulation Environment
Convergence Analysis

Learning with a Strong Adversary

Authors: Ruitong Huang, Bing Xu, Dale Schuurmans, Csaba Szepesvari | Published: 2015-11-10 | Updated: 2016-01-16
Relationship between Robustness and Privacy
Adversarial Learning
Deep Learning