文献データベース

Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness

Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07
アルゴリズム
機械学習アルゴリズム
機械学習手法

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen | Published: 2020-05-14 | Updated: 2020-05-15
グラフ表現学習
マルウェア検出手法
深層学習技術

Protecting the integrity of the training procedure of neural networks

Authors: Christian Berghoff | Published: 2020-05-14
データ依存性
トレーニング手法
機械学習アルゴリズム

Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning

Authors: Pieter Delobelle, Paul Temple, Gilles Perrouin, Benoît Frénay, Patrick Heymans, Bettina Berendt | Published: 2020-05-14 | Updated: 2020-09-01
公平性評価
敵対的サンプル
機械学習の応用

Data Augmentation for Deep Candlestick Learner

Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29
キャンドルスティックパターン
データ依存性
機械学習の応用

Prive-HD: Privacy-Preserved Hyperdimensional Computing

Authors: Behnam Khaleghi, Mohsen Imani, Tajana Rosing | Published: 2020-05-14
プライバシー漏洩
計算効率
適応型再訓練メカニズム

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan | Published: 2020-05-13
URL解析手法
ランダムフォレスト
機械学習アルゴリズム

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13
アルゴリズム
グラフ機械学習の説明可能性
防御効果分析

Android Malware Clustering using Community Detection on Android Packages Similarity Network

Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Published: 2020-05-12
コミュニティ検出
マルウェア拡散手段
計算効率

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12
セキュリティ保証
プライバシー評価
脆弱性評価手法