AIセキュリティポータルbot

Collaborative Receptive Field Learning

Authors: Shu Kong, Zhuolin Jiang, Qiang Yang | Published: 2014-02-02
Graph Representation Learning
Experimental Validation
Machine Learning Method

Security Evaluation of Support Vector Machines in Adversarial Environments

Authors: Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli | Published: 2014-01-30
Poisoning
Model Extraction Attack
Vulnerability of Adversarial Examples

Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps

Authors: Karen Simonyan, Andrea Vedaldi, Andrew Zisserman | Published: 2013-12-20 | Updated: 2014-04-19
XAI (Explainable AI)
Deep Learning Technology
Feature Importance Analysis

Machine Learning Techniques for Intrusion Detection

Authors: Mahdi Zamani, Mahnush Movahedi | Published: 2013-12-08 | Updated: 2015-05-09
Network Traffic Analysis
Machine Learning Method
異常検知

Visualizing and Understanding Convolutional Networks

Authors: Matthew D Zeiler, Rob Fergus | Published: 2013-11-12 | Updated: 2013-11-28
XAI (Explainable AI)
Deep Learning Technology
Feature Importance Analysis

ConXsense – Automated Context Classification for Context-Aware Access Control

Authors: Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan | Published: 2013-08-13 | Updated: 2014-06-05
Access Control
Device Authentication
Privacy Issues

Bayesian Optimization in a Billion Dimensions via Random Embeddings

Authors: Ziyu Wang, Frank Hutter, Masrour Zoghi, David Matheson, Nando de Freitas | Published: 2013-01-09 | Updated: 2016-01-10
Convergence Analysis
Definition of Mathematical Concepts
Machine Learning Method