文献データベース

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26
モデル保護手法
脆弱性評価手法
防御メカニズム

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25
敵対的サンプルの脆弱性
最適化手法
無線チャネル検出

Black-box Detection of Backdoor Attacks with Limited Information and Data

Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24
バックドア攻撃
最適化手法
防御メカニズム

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24
最適化手法
脆弱性評価手法
防御メカニズム

CNN vs ELM for Image-Based Malware Classification

Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24
PEマルウェア分類
最適化手法
画像特徴抽出

Detecting Phishing Sites — An Overview

Authors: P. Kalaharsha, B. M. Mehtre | Published: 2021-03-23 | Updated: 2021-04-06
URLベース検出
フィッシング
フィッシング攻撃の検出率

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23
多出力モデル
脆弱性検出
評価指標

Security of Healthcare Data Using Blockchains: A Survey

Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma | Published: 2021-03-23
データ保護手法
ブロックチェーン技術
医療データの種類

Anomaly Detection using Principles of Human Perception

Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13
データ抽出と分析
異常検知アルゴリズム
統計的手法

Federated Quantum Machine Learning

Authors: Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2021-03-22
深層強化学習
連合学習
量子ニューラルネットワーク