文献データベース

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning

Authors: Anshuka Rangi, Haifeng Xu, Long Tran-Thanh, Massimo Franceschetti | Published: 2022-08-29
サイバー攻撃
報酬メカニズム設計
最適化問題

Lateral Movement Detection Using User Behavioral Analysis

Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29
ユーザ行動分析
機械学習技術
特徴抽出手法

Overparameterization from Computational Constraints

Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15
デジタル署名の検証
機械学習技術
関数の定義

Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits

Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26
プライバシー保護手法
フレームワーク
実験的検証

I still know it’s you! On Challenges in Anonymizing Source Code

Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10
コード匿名性
プライバシー保護手法
不確実性評価

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal | Published: 2022-08-26
キャンペーンメトリクス
フィッシング
悪意のあるURL分析

DiVa: An Accelerator for Differentially Private Machine Learning

Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26
モデル性能評価
効率性評価
学習の改善

COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27
サイバーセキュリティ
プライバシー侵害
ユーザー活動解析

SNAP: Efficient Extraction of Private Properties with Poisoning

Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21
バックドア攻撃
プロパティ推論
攻撃手法

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25
サイバーセキュリティ
攻撃検出
機械学習