文献データベース

Applications of Machine Learning in Cryptography: A Survey

Authors: Mohammed M. Alani | Published: 2019-02-11
メンバーシップ推論
攻撃の分類
暗号技術の歴史

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11
グラフ構築
マルウェア検出手法
分類パターン分析

Fake News Detection on Social Media using Geometric Deep Learning

Authors: Federico Monti, Fabrizio Frasca, Davide Eynard, Damon Mannion, Michael M. Bronstein | Published: 2019-02-10
データの起源と変遷
偽情報の検出
情報収集手法

Model Compression with Adversarial Robustness: A Unified Optimization Framework

Authors: Shupeng Gui, Haotao Wang, Chen Yu, Haichuan Yang, Zhangyang Wang, Ji Liu | Published: 2019-02-10 | Updated: 2019-12-28
敵対的学習
敵対的攻撃
最適化戦略

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11
トリガーの検知
モデルの頑健性保証
ロバスト性向上手法

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08
モデルの頑健性保証
敵対的攻撃手法
画像分類解釈

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08
プライバシー保護手法
初期シード生成
差分プライバシー

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19
データの起源と変遷
情報収集手法
脆弱性回避手法

Optimizing seed inputs in fuzzing with machine learning

Authors: Liang Cheng, Yang Zhang, Yi Zhang, Chen Wu, Zhangtan Li, Yu Fu, Haisheng Li | Published: 2019-02-07
ファジング
初期シード生成

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19
バックドアモデルの検知
モデル抽出攻撃の検知
視覚プライバシー