文献データベース

Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06
プライバシー保護
プライバシー保護手法
量子計算

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21
PLCプログラミング
性能評価
機械学習フレームワーク

Toward More Generalized Malicious URL Detection Models

Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09
トークン分布分析
バイアス
一般化の影響

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
ポイズニング
ロバスト性
適応型敵対的訓練

NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks

Authors: Haoyu Liu, Paul Patras | Published: 2022-02-20 | Updated: 2022-04-20
DDoS攻撃
侵入検知システム
攻撃チェーン分析

Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems

Authors: Nils Müller, Charalampos Ziras, Kai Heussen | Published: 2022-02-18 | Updated: 2023-01-03
データ収集
マルチクラス分類
侵入検知システム

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
データ汚染検出
ポイズニング
収束分析

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
ポイズニング
悪意のあるノードの注入
防御手法

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption

Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14
アルゴリズム設計
ユーザー認証システム
暗号プロトコル

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Authors: Songlei Wang, Yifeng Zheng, Xiaohua Jia | Published: 2022-02-16 | Updated: 2023-01-31
トレーニングプロトコル
プライバシー保護プロトコル
暗号プロトコル