文献データベース

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01
FDI攻撃検出手法
サイバーセキュリティ
深層学習技術

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27
データ生成
テキスト生成手法
敵対的攻撃

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31
データ生成
モジュール再構成
著者識別手法

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30
データ生成
情報隠蔽手法
敵対的攻撃

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30
敵対的サンプル
敵対的攻撃
深層学習技術

Adversarial Privacy Preserving Graph Embedding against Inference Attack

Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30
プライバシー保護
メンバーシップ推論
敵対的攻撃

Improving Resistance to Adversarial Deformations by Regularizing Gradients

Authors: Pengfei Xia, Bin Li | Published: 2020-08-29 | Updated: 2020-10-06
ポイズニング
敵対的サンプル
敵対的攻撃

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28
プロトコル手順
信頼評価モジュール
情報収集手法

Against Membership Inference Attack: Pruning is All You Need

Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04
メンバーシップ推論
敵対的攻撃
深層学習技術

Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch | Published: 2020-08-27
データ生成
プライバシー損失分析
プライバシー評価