文献データベース

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11
トレードオフ分析
プライバシー手法
ポイズニング

Balancing Privacy and Performance for Private Federated Learning Algorithms

Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18
プライバシー手法
ポイズニング
最適化手法

Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning

Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10
DNN IP保護手法
不確実性マップ
自己注意メカニズム

Reinforcement Learning-Based Black-Box Model Inversion Attacks

Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10
DNN IP保護手法
プライバシー手法
生成モデルの課題

Ransomware Detection and Classification Strategies

Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10
ネットワーク脅威検出
マルウェア検出手法
機械学習技術

Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence

Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06
プロンプトインジェクション
実験的検証
攻撃の評価

Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy

Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21
クライアントクラスタリング
プライバシー手法
最適化問題

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
セキュリティ分析
性能評価
機械学習技術

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07
プロトコル性能評価
マルウェア検出手法
特徴抽出手法

SCART: Simulation of Cyber Attacks for Real-Time

Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07
データ生成
脅威モデリング
運用シナリオ