文献データベース

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04
ポイズニング
マルウェア分類
機械学習の役割

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29
アルゴリズム
ポイズニング
評価指標

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27
ポイズニング
マルウェア分類
敵対的サンプル

Differentially Private Collaborative Intrusion Detection Systems For VANETs

Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02
アルゴリズム
プライバシー分析
プライバシー評価

Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees

Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01
アルゴリズム
敵対的サンプル
最適化戦略

Studying Ransomware Attacks Using Web Search Logs

Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23
ユーザー行動分析
ランサムウェア評価
情報収集手法

Differentially Private Federated Learning with Laplacian Smoothing

Authors: Zhicong Liang, Bao Wang, Quanquan Gu, Stanley Osher, Yuan Yao | Published: 2020-05-01 | Updated: 2021-09-10
プライバシー分析
プライバシー評価
連合学習システム

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14
バックドア攻撃
ポイズニング
防御効果分析

Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness

Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03
バックドア攻撃
ポイズニング
ロバスト性向上手法

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
アルゴリズム
敵対的攻撃検出
機械学習の役割