Vulnerability Assessment Method

Estimating g-Leakage via Machine Learning

Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24
Bayesian Classification
Role of Machine Learning
Vulnerability Assessment Method

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
Attack Evaluation
Vulnerability Assessment Method
Defense Method

Challenges in Forecasting Malicious Events from Incomplete Data

Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06
Security Analysis
Dataset evaluation
Vulnerability Assessment Method

Artificial Intelligence Techniques for Security Vulnerability Prevention

Authors: Steve Kommrusch | Published: 2019-12-14
Machine Learning Technology
Vulnerability Assessment Method
Automated Vulnerability Remediation

Certifiable Robustness to Graph Perturbations

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19
Graph Neural Network
Attack Method
Vulnerability Assessment Method