文献データベース

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01
MLベースのIDS
パフォーマンス評価
深層学習技術

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25
データ管理システム
パフォーマンス評価
メモリ管理手法

Darknet Data Mining — A Canadian Cyber-crime Perspective

Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18
ダークネットトラフィック分析
データ収集
リスク管理

Machine learning on knowledge graphs for context-aware security monitoring

Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18
MLベースのIDS
ユーザー活動解析
知識グラフ

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23
パフォーマンス評価
敵対的サンプル
敵対的攻撃検出

On the Robustness of Domain Constraints

Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07
データ整合性制約
メンバーシップ推論
敵対的学習

RAIDER: Reinforcement-aided Spear Phishing Detector

Authors: Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone | Published: 2021-05-17 | Updated: 2023-01-03
フィッシング攻撃
深層強化学習
特徴選択手法

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16
クラス不均衡
モデル選択
脆弱性管理

Undistillable: Making A Nasty Teacher That CANNOT teach students

Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16
敵対的学習
深層学習技術
自己教師あり学習

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22
UAPトレーニング手法
敵対的攻撃検出
防御メカニズム