AIセキュリティポータルbot

Encrypted statistical machine learning: new privacy preserving methods

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-27
Ensemble Learning
Data Augmentation in Encrypted Domains
暗号化環境でのデータ処理

A review of homomorphic encryption and software tools for encrypted statistical machine learning

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-26
Privacy Protection Mechanism
Privacy-Preserving Machine Learning
暗号化スキームの詳細

Efficient Private Statistics with Succinct Sketches

Authors: Luca Melis, George Danezis, Emiliano De Cristofaro | Published: 2015-08-25 | Updated: 2016-01-06
Data Collection
Privacy Protection Mechanism
Differential Privacy

Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features

Authors: Joshua Saxe, Konstantin Berlin | Published: 2015-08-13 | Updated: 2015-09-03
Machine learning
Model Performance Evaluation
Malware Detection with Limited Samples

Automatic Extraction of the Passing Strategies of Soccer Teams

Authors: Laszlo Gyarmati, Xavier Anguera | Published: 2015-08-10
チーム戦略分析
Data Collection
Feature Extraction Method

Using Deep Learning for Detecting Spoofing Attacks on Speech Signals

Authors: Alan Godoy, Flávio Simões, José Augusto Stuchi, Marcus de Assis Angeloni, Mário Uliani, Ricardo Violato | Published: 2015-08-07 | Updated: 2016-01-19
Detection of Deepfakes
Feature Extraction
Speech Recognition Process

STC Anti-spoofing Systems for the ASVspoof 2015 Challenge

Authors: Sergey Novoselov, Alexandr Kozlov, Galina Lavrentyeva, Konstantin Simonchik, Vadim Shchemelinin | Published: 2015-07-29
Adversarial Attack Assessment
Feature Extraction
Speech Recognition Process

On the Unicity of Smartphone Applications

Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia | Published: 2015-07-28 | Updated: 2015-10-29
Data Origins and Evolution
Privacy Loss Analysis
Convergence Guarantee

Differentially Private Ordinary Least Squares

Authors: Or Sheffet | Published: 2015-07-09 | Updated: 2017-08-21
Privacy Loss Analysis
Differential Privacy
Matrix Multiplication Methods

Malware Task Identification: A Data Driven Approach

Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch | Published: 2015-07-07
Digital Forensics
属性学習
Vulnerability Analysis