文献データベース

On the Vulnerability of Backdoor Defenses for Federated Learning

Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19
DNN IP保護手法
ポイズニング
特徴重要度分析

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13
プライバシー保護技術
ユーザー認証システム
自己注意メカニズム

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19
ポイズニング
メンバーシップ推論
脆弱性管理

Using Topological Data Analysis to classify Encrypted Bits

Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18
アルゴリズム設計
機械学習
画像フォレンジック

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17
プライバシー保護技術
モデル性能評価
特徴重要度分析

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17
データ収集
プログラム解析
機械学習技術

A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis

Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15
性能評価指標
機械学習技術
特徴選択手法

Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms

Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12
データ収集
未知の攻撃検出
機械学習手法

SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning

Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11
DNN IP保護手法
敵対的攻撃手法
構造的攻撃

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
サイバー攻撃
ハニーポット技術
プログラム解析