文献データベース

ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System

Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20
サイバーセキュリティ
侵入検知システム
注意メカニズム

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
バックドア攻撃
攻撃タイプ
説明可能性

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
ユーザ行動分析
攻撃タイプ
機械学習手法

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte | Published: 2022-04-19 | Updated: 2022-04-21
AI/ML技術の応用
アナログIC設計の課題
設計最適化手法

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
アルゴリズム設計
トロイの木馬検出
機械学習手法

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18
バックドア攻撃
メンバーシップ推論
防御手法

Exploiting Multiple EEG Data Domains with Adversarial Learning

Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16
データセット評価
機械学習手法
生成的敵対ネットワーク

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16
プライバシー保護技術
暗号プロトコル
機械学習手法

Just Fine-tune Twice: Selective Differential Privacy for Large Language Models

Authors: Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu | Published: 2022-04-15 | Updated: 2022-10-27
プライバシー保護技術
機械学習の応用
秘密検出器

Investigating Positive and Negative Qualities of Human-in-the-Loop Optimization for Designing Interaction Techniques

Authors: Liwei Chan, Yi-Chi Liao, George B. Mo, John J. Dudley, Chun-Lien Cheng, Per Ola Kristensson, Antti Oulasvirta | Published: 2022-04-15
ヒューマンインザループ
ベイズ最適化
最適化問題