文献データベース

Architectures for Detecting Interleaved Multi-stage Network Attacks Using Hidden Markov Models

Authors: Tawfeeq Shawly, Ali Elghariani, Jason Kobes, Arif Ghafoor | Published: 2018-07-25 | Updated: 2019-10-30
マルコフモデル
攻撃シナリオ分析
状態遷移モデル

Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication

Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25
モデルの設計や精度
差分プライバシー
特徴抽出手法

2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem

Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23
トリガーの検知
プライバシー評価
モデルの設計や精度

MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games

Authors: Lijun Yu, Dawei Zhang, Xiangqun Chen, Xing Xie | Published: 2018-07-22
ゲーム理論
モデルの設計や精度
モデル評価

A Preliminary Study On the Sustainability of Android Malware Detection

Authors: Haipeng Cai | Published: 2018-07-22 | Updated: 2018-08-03
マルウェア検出
モデル評価
行動解析手法

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection

Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22
モデル評価
早期検出手法
特徴選択手法

Simultaneous Adversarial Training – Learn from Others Mistakes

Authors: Zukang Liao | Published: 2018-07-21 | Updated: 2018-09-10
モデルの頑健性保証
ロバスト性に関する評価
敵対的攻撃

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28
モデル評価
敵対的攻撃

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18
モデルの設計や精度
敵対的攻撃
機械学習

Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

Authors: Vineeth S. Bhaskara, Debanjan Bhattacharyya | Published: 2018-07-19 | Updated: 2018-07-30
マルウェア分類
特徴抽出手法
行動解析手法