文献データベース

Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02
モデルの解釈性
モデル性能評価
実験的検証

CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach

Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01
モデル性能評価
実験的検証
階層的分類手法

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31
XAIの応用
データセット生成
モデルの解釈性

Membership Inference Attacks by Exploiting Loss Trajectory

Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31
メンバーシップ推論
モデルアーキテクチャ
敵対的攻撃

Fraud Dataset Benchmark and Applications

Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22
データセット生成
特徴重要度分析

A Black-Box Attack on Optical Character Recognition Systems

Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30
敵対的サンプル
敵対的攻撃
最適化手法

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations

Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30
攻撃検出
特徴重要度分析
脆弱性検出

Reducing Certified Regression to Certified Classification for General Poisoning Attacks

Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29
ポイズニング
モデルアーキテクチャ
ロバスト回帰

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29
報酬メカニズム設計
最適化問題
機械学習技術

Towards Adversarial Purification using Denoising AutoEncoders

Authors: Dvij Kalaria, Aritra Hazra, Partha Pratim Chakrabarti | Published: 2022-08-29
DNN IP保護手法
ウォーターマーキング
適応型再訓練メカニズム