文献データベース

Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids

Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18
ハードウェア設計
マルウェア分類
脆弱性検出

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt | Published: 2020-09-16 | Updated: 2021-07-25
デバイス識別手法
機械学習
通信効率

Data Poisoning Attacks on Regression Learning and Corresponding Defenses

Authors: Nicolas Michael Müller, Daniel Kowatsch, Konstantin Böttinger | Published: 2020-09-15
バックドア攻撃
ポイズニング
ロバスト回帰

Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup

Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30
データ生成
最適化アルゴリズムの選択と評価
機械学習

Private data sharing between decentralized users through the privGAN architecture

Authors: Jean-Francois Rajotte, Raymond T Ng | Published: 2020-09-14
データ生成
プライバシー保護
倫理的考慮

Robust Deep Learning Ensemble against Deception

Authors: Wenqi Wei, Ling Liu | Published: 2020-09-14
敵対的サンプル
敵対的攻撃検出
敵対的訓練

Input Hessian Regularization of Neural Networks

Authors: Waleed Mustafa, Robert A. Vandermeulen, Marius Kloft | Published: 2020-09-14
ポイズニング
ロバスト回帰
敵対的訓練

Dual-Mandate Patrols: Multi-Armed Bandits for Green Security

Authors: Lily Xu, Elizabeth Bondi, Fei Fang, Andrew Perrault, Kai Wang, Milind Tambe | Published: 2020-09-14 | Updated: 2024-04-26
報酬メカニズム設計
性能評価指標
最適化アルゴリズムの選択と評価

A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses

Authors: Ambar Pal, René Vidal | Published: 2020-09-14 | Updated: 2020-11-11
ゲーム理論
ポイズニング
敵対的訓練

SAPAG: A Self-Adaptive Privacy Attack From Gradients

Authors: Yijue Wang, Jieren Deng, Dan Guo, Chenghong Wang, Xianrui Meng, Hang Liu, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-09-14
プライバシー問題
再構築耐久性
分散学習