文献データベース

Towards Plausible Differentially Private ADMM Based Distributed Machine Learning

Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11
プライバシー保護手法
最適化問題
計算効率

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks

Authors: Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-08-11 | Updated: 2020-12-09
グループベースの堅牢性
バックドア攻撃
ポイズニング攻撃

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
ウォーターマーキング
データ抽出と分析
情報セキュリティ

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10
データ抽出と分析
機械学習フレームワーク
脆弱性管理

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10
ポイズニング攻撃
機械学習フレームワーク
通信効率

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09
データ抽出と分析
プライバシー管理
計算効率

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09
性能評価指標
攻撃検出
機械学習の応用

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03
データ抽出と分析
デバイス識別手法
リソース使用分析

Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification

Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17
不確実性評価
敵対的攻撃手法
深層学習手法

Optimizing Information Loss Towards Robust Neural Networks

Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29
情報理論的アプローチ
敵対的サンプル
敵対的攻撃手法