AIセキュリティポータルbot

Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2015-02-23 | Updated: 2016-04-27
Privacy Enhancing Technology
学習可能性
Differential Privacy

PowerSpy: Location Tracking using Mobile Device Power Analysis

Authors: Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh | Published: 2015-02-11 | Updated: 2015-08-18
Energy Efficiency
Privacy Enhancing Technology
位置情報推測

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices

Authors: Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan | Published: 2015-01-11
Simulation Environment
Privacy Enhancing Technology
Differential Privacy

Differential Privacy and Machine Learning: a Survey and Review

Authors: Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Published: 2014-12-24
Privacy Enhancing Technology
Differential Privacy
Dimensionality Reduction Method

Towards Deep Neural Network Architectures Robust to Adversarial Examples

Authors: Shixiang Gu, Luca Rigazio | Published: 2014-12-11 | Updated: 2015-04-09
Certified Robustness
Robustness
Deep Learning Technology

Understanding Deep Image Representations by Inverting Them

Authors: Aravindh Mahendran, Andrea Vedaldi | Published: 2014-11-26
XAI (Explainable AI)
Model Inversion
Deep Learning Method

Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry

Authors: Kunal Talwar, Abhradeep Thakurta, Li Zhang | Published: 2014-11-20 | Updated: 2016-11-20
Privacy Enhancing Technology
Privacy Loss Analysis
フランク・ウォルフアルゴリズム

CONDENSER: A Graph-Based Approachfor Detecting Botnets

Authors: Pedro Camelo, Joao Moura, Ludwig Krippahl | Published: 2014-10-31
Clustering methods
Network Packet Management
Communication Efficiency

Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection

Authors: Antti Juvonen, Tuomo Sipola | Published: 2014-10-28
Clustering methods
Data Preprocessing
Framework Support

Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination

Authors: Amit Datta, Michael Carl Tschantz, Anupam Datta | Published: 2014-08-27 | Updated: 2015-03-17
Privacy Technique
Experimental Validation
Ad Blocking System