文献データベース

Interpretable Explanations of Black Boxes by Meaningful Perturbation

Authors: Ruth Fong, Andrea Vedaldi | Published: 2017-04-11 | Updated: 2021-12-03
XAI(説明可能なAI)
深層学習手法
特徴重要度分析

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)

Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10
セキュリティ分析手法
デバイス感度分析
脆弱性分析

Learning Important Features Through Propagating Activation Differences

Authors: Avanti Shrikumar, Peyton Greenside, Anshul Kundaje | Published: 2017-04-10 | Updated: 2019-10-12
XAI(説明可能なAI)
深層学習手法
特徴重要度分析

Enhancing Robustness of Machine Learning Systems via Data Transformations

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal | Published: 2017-04-09 | Updated: 2017-11-29
モデルの頑健性保証
モデル抽出攻撃
防御効果分析

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-04-06 | Updated: 2017-04-08
セキュリティ分析手法
プログラム解析
マルウェア検出手法

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks

Authors: Yi Han, Benjamin I. P. Rubinstein | Published: 2017-04-06 | Updated: 2017-05-25
ポイズニング
モデルの頑健性保証
対抗的学習

Comment on “Biologically inspired protection of deep networks from adversarial attacks”

Authors: Wieland Brendel, Matthias Bethge | Published: 2017-04-05
トリガーの検知
モデルの頑健性保証
対抗的学習

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2017-03-31
オンラインマルウェア検出
動的分析手法
性能評価手法

Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks

Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24
データ生成
ディープフェイク
画像処理

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28
IoTセキュリティ問題
セキュリティ分析手法
攻撃手法