Information Security

Phocas: dimensional Byzantine-resilient stochastic gradient descent

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-05-23
Byzantine Attack Countermeasures
Information Security
Loss Function

Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models

Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18
Certified Robustness
Information Security
Adversarial Attack Detection

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09
Cybersecurity
Information Security
Attack Detection

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07
Cybersecurity
Information Security
Deep Learning Model

Automatic Classification of Object Code Using Machine Learning

Authors: John Clemens | Published: 2018-05-06
Data-Driven Vulnerability Assessment
Program Analysis
Information Security

Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15
Data Collection Method
Malware Detection Method
Information Security

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System

Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07
Malware Detection Method
Information Security
Anomaly Detection Method

Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries

Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12
Convergence Property
Information Security
Structural Attack

Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01
Information Security
Information Flow Control
Watermark

Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid

Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25
Privacy Enhancing Technology
Information Security
Anomaly Detection Method