文献データベース

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28
データ保護手法
プライバシー評価
敵対的攻撃手法

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13
トランザクション優先順位付け
プライバシー評価
不正取引

Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami | Published: 2020-05-28
エネルギー管理
プライバシー評価
動的料金設定

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28
パフォーマンス評価
プライバシー評価
機械学習

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
パフォーマンス評価
攻撃の評価
機械学習

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18
敵対的サンプル
敵対的攻撃
機械学習技術

Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries

Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27
トレーニングデータ生成
敵対的サンプル
防御効果分析

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27
アルゴリズム
機械学習
機械学習技術

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27
敵対的攻撃
機械学習技術
通信損失

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27
アルゴリズム
攻撃の評価
最適化手法