文献データベース

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04
モデル抽出攻撃
攻撃の評価
防御手法

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15
トリガーの検知
ロバスト性向上
攻撃の評価

QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-14
モデルの頑健性保証
量子化手法
防御手法

Structure and Content of the Visible Darknet

Authors: Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros | Published: 2018-11-04 | Updated: 2018-11-07
ダークネット分析
データ収集
法律遵守

Learning to Defend by Learning to Attack

Authors: Haoming Jiang, Zhehui Chen, Yuyang Shi, Bo Dai, Tuo Zhao | Published: 2018-11-03 | Updated: 2021-05-02
オンライン学習
ロバスト最適化
敵対的学習

A Marauder’s Map of Security and Privacy in Machine Learning

Authors: Nicolas Papernot | Published: 2018-11-03
ITセキュリティの課題
不確実性の定量化
差分プライバシー

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14
バックドア攻撃用の毒データの検知
ポイズニング
性能評価手法

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14
ポイズニング
マルウェア進化
モデルの頑健性保証

Stronger Data Poisoning Attacks Break Data Sanitization Defenses

Authors: Pang Wei Koh, Jacob Steinhardt, Percy Liang | Published: 2018-11-02 | Updated: 2021-12-03
ポイズニング
ロバスト性分析
ロバスト最適化

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02
IoTトラフィック特性
性能評価手法
特徴選択手法