AIセキュリティポータルbot

MCMC for Variationally Sparse Gaussian Processes

Authors: James Hensman, Alexander G. de G. Matthews, Maurizio Filippone, Zoubin Ghahramani | Published: 2015-06-12
Core Set Construction
Convergence Guarantee
因果推論

Adaptive Normalized Risk-Averting Training For Deep Neural Networks

Authors: Zhiguang Wang, Tim Oates, James Lo | Published: 2015-06-08 | Updated: 2016-06-09
Adversarial Learning
Visual Techniques

Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning

Authors: Yarin Gal, Zoubin Ghahramani | Published: 2015-06-06 | Updated: 2016-10-04
Bayesian Optimization
Quantification of Uncertainty
Deep Learning Method

A Deeper Look at Dataset Bias

Authors: Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars | Published: 2015-05-06
Bias Elimination in Training Data
Performance Evaluation
Deep Learning Model

Spectral Norm of Random Kernel Matrices with Applications to Privacy

Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson | Published: 2015-04-22
Privacy Loss Analysis
Matrix Multiplication Methods
High-Dimensional Data Analysis

Detection of Information leakage in cloud

Authors: Mansaf Alam, Shuchi Sethi | Published: 2015-04-14 | Updated: 2015-11-06
Secure Communication Channel
仮想環境の攻撃
出力処理

Consensus based Detection in the Presence of Data Falsification Attacks

Authors: Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney | Published: 2015-04-14
Specific Measures Against Byzantine Behavior
Adversarial Attack Analysis
Communication Model

Machine Learning Methods for Attack Detection in the Smart Grid

Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor | Published: 2015-03-22
Online Learning
Performance Evaluation
Adversarial Attack Analysis

Automated detection and classification of cryptographic algorithms in binary programs through machine learning

Authors: Diane Duros Hosfelt | Published: 2015-03-04
Clustering methods
機械学習によるマルウェア分類
Feature Interdependence

Detecting Malware with Information Complexity

Authors: Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis | Published: 2015-02-26
Malware Detection
Random Forest
Information-Theoretic Evaluation