文献データベース

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13
動的分析
暗号技術
特徴抽出手法

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13
アクティブラーニング
ネットワーク脅威検出
性能評価

One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy

Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13
プライバシー保護技術
メンバーシップ推論
防御手法

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13
ポイズニング
最適化手法
深層学習技術

An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11
トレーニングデータ生成
敵対的サンプル
防御手法

Designing ML-Resilient Locking at Register-Transfer Level

Authors: Dominik Sisejkovic, Luca Collini, Benjamin Tan, Christian Pilato, Ramesh Karri, Rainer Leupers | Published: 2022-03-10 | Updated: 2022-04-06
セキュリティメトリック
ロバスト性
最適化手法

Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System

Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10
パフォーマンス評価
深層学習手法
特徴エンジニアリング

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks

Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25
グラフニューラルネットワーク
深層学習手法
脆弱性分析

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Authors: Giovanni Apruzzese, Luca Pajola, Mauro Conti | Published: 2022-03-09
データセット生成
フレームワーク
一般化性能

Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection

Authors: João Vitorino, Nuno Oliveira, Isabel Praça | Published: 2022-03-08 | Updated: 2022-03-29
DDoS攻撃
データ生成
ロバスト性評価