文献データベース

Active Learning for Network Intrusion Detection

Authors: Amir Ziai | Published: 2019-04-02
アクティブラーニング
データ前処理
機械学習の応用

Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier

Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02
アンサンブル学習
機械学習の応用
評価指標

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30
モデル抽出攻撃
再構成攻撃
敵対的攻撃検出

TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering

Authors: Farzam Fanitabasi | Published: 2019-04-01
データ保護手法
データ駆動型クラスタリング
プライバシー保護手法

Defending against adversarial attacks by randomized diversification

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01
敵対的サンプルの検知
敵対的攻撃検出
透かしの耐久性

Deep Learning in steganography and steganalysis from 2015 to 2018

Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16
ステガノグラフィー手法
機械学習の応用
深層学習に基づくIDS

On the Vulnerability of CNN Classifiers in EEG-Based BCIs

Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31
モデルの頑健性保証
敵対的学習
敵対的攻撃検出

A Machine Learning Framework for Biometric Authentication using Electrocardiogram

Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo | Published: 2019-03-29 | Updated: 2019-08-05
データ前処理
信号処理
生体認証技術

Benchmarking Neural Network Robustness to Common Corruptions and Perturbations

Authors: Dan Hendrycks, Thomas Dietterich | Published: 2019-03-28
ロバスト最適化
敵対的学習
敵対的攻撃検出

Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Umar Janjua, Falak Sher | Published: 2019-03-28
偽情報の検出
心理的操作
情報漏洩の原因