Machine Learning

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18
Model Design and Accuracy
Adversarial attack
Machine Learning

Implicit Weight Uncertainty in Neural Networks

Authors: Nick Pawlowski, Andrew Brock, Matthew C. H. Lee, Martin Rajchl, Ben Glocker | Published: 2017-11-03 | Updated: 2018-05-25
Robustness
Adversarial Learning
Machine Learning

SPARK: Static Program Analysis Reasoning and Retrieving Knowledge

Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03
Security Analysis Method
Machine Learning
Knowledge Extraction Method

BinPro: A Tool for Binary Source Code Provenance

Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02
Machine Learning
Watermarking Technology
Similarity Measurement

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01
Security Information Management
Machine Learning
Watermarking Technology

Intrusion Prevention and Detection in Grid Computing – The ALICE Case

Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20
Security Analysis
Proactive Defense
Machine Learning