AIセキュリティポータルbot

Offline Signature-Based Fuzzy Vault (OSFV: Review and New Results

Authors: George S. Eskander, Robert Sabourin, Eric Granger | Published: 2014-08-18
Core Set Construction
Fuzzy System
Privacy Protection Method

Prediction with Advice of Unknown Number of Experts

Authors: Alexey Chernov, Vladimir Vovk | Published: 2014-08-09
Online Learning
Convergence Analysis
情報理論

An Evasion and Counter-Evasion Study in Malicious Websites Detection

Authors: Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye | Published: 2014-08-08
Model Protection Methods
Model Extraction Attack
Adversarial Learning

An Automated Social Graph De-anonymization Technique

Authors: Kumar Sharad, George Danezis | Published: 2014-08-06 | Updated: 2014-08-07
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Data Generation
Privacy-Preserving Machine Learning

Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases

Authors: Fei Yu, Michal Rybar, Caroline Uhler, Stephen E. Fienberg | Published: 2014-07-30
Privacy Technique
Model Protection Methods
Efficiency Evaluation

Can’t you hear me knocking: Identification of user actions on Android apps via traffic analysis

Authors: Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde | Published: 2014-07-29
Data Preprocessing
Experimental Validation
Behavioral Authentication System

TweetCred: Real-Time Credibility Assessment of Content on Twitter

Authors: Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, Patrick Meier | Published: 2014-05-21 | Updated: 2015-01-30
SNS分析
Reliability Assessment
Semi-Supervised Learning

Graph-based Anomaly Detection and Description: A Survey

Authors: Leman Akoglu, Hanghang Tong, Danai Koutra | Published: 2014-04-18 | Updated: 2014-04-28
Clustering methods
グラフベースの異常検出
Time Series Analysis

Unsupervised Anomaly-based Malware Detection using Hardware Features

Authors: Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo | Published: 2014-03-07 | Updated: 2014-03-28
Hardware Security
Malware Detection
Machine Learning Technology

Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy

Authors: Nyagudi Musandu Nyagudi | Published: 2014-02-10
Algorithm Fairness
ターゲット特性評価
Machine Learning Technology