文献データベース

Btech thesis report on adversarial attack detection and purification of adverserially attacked images

Authors: Dvij Kalaria | Published: 2022-05-09
攻撃検出
敵対的サンプル
適応型敵対的訓練

On Generalisability of Machine Learning-based Network Intrusion Detection Systems

Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09
パフォーマンス評価
侵入検知システム
攻撃検出

A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection

Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09
攻撃手法
機械学習手法
温度条件

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16
プライバシー評価
ユーザー体験評価
攻撃手法

Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection

Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08
パフォーマンス評価
侵入検知システム
攻撃手法

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone | Published: 2022-05-07
ユーザー体験評価
ランダムフォレスト
性能評価

Privacy accounting $\varepsilon$conomics: Improving differential privacy composition via a posteriori bounds

Authors: Valentin Hartmann, Vincent Bindschaedler, Alexander Bentkamp, Robert West | Published: 2022-05-06 | Updated: 2023-06-19
ODP分析
プライバシー手法
プライバシー評価

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10
プライバシー保護技術
攻撃手法
通信効率

Large Scale Transfer Learning for Differentially Private Image Classification

Authors: Harsh Mehta, Abhradeep Thakurta, Alexey Kurakin, Ashok Cutkosky | Published: 2022-05-06 | Updated: 2022-05-20
プライバシー分析
プライバシー評価
機械学習の応用

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05
ロバスト性評価
信頼評価モジュール
脆弱性分析