文献データベース

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
モデル性能評価
敵対的攻撃
脆弱性分析

Proof-of-Learning: Definitions and Practice

Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09
データ依存性
モデル性能評価
敵対的攻撃

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency

Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09
モデル性能評価
深層学習手法
透かし評価

Deep Learning for Android Malware Defenses: a Systematic Literature Review

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09
マルウェア検出
深層学習手法
防御手法

Word Embedding Techniques for Malware Evolution Detection

Authors: Sunhera Paul, Mark Stamp | Published: 2021-03-07
PEマルウェア分類
時間ウィンドウ解析
進化スコア計算

On Ensemble Learning

Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07
パフォーマンス評価
機械学習の応用
評価手法

Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain

Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07
攻撃シナリオ分析
敵対的サンプルの検知
敵対的学習

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11
テキストの摂動手法
バックドアモデルの検知
攻撃手法

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06
フロー集約手法
攻撃検出
評価指標

MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection

Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05
ウォーターマーキング
マルチクラス分類
深層学習技術