文献データベース

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
敵対的サンプルの検知
敵対的攻撃手法
透かし技術

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13
FDI攻撃検出手法
性能評価
異常検知手法

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content

Authors: Joshua Saxe, Richard Harang, Cody Wild, Hillary Sanders | Published: 2018-04-13
ウェブページコンテンツ分析
バックドアモデルの検知
深層学習

A Grid Based Adversarial Clustering Algorithm

Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21
データ汚染検出
敵対的攻撃分析
異常検知手法

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models

Authors: Hyrum S. Anderson, Phil Roth | Published: 2018-04-12 | Updated: 2018-04-16
PEファイルフォーマット
データセット評価
静的マルウェア検出

Machine Learning DDoS Detection for Consumer Internet of Things Devices

Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11
モデルDoS
家庭ルーターでのIoT脅威検出
異常検知手法

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
ユーザー行動分析
ユーザ行動分析
通信解析

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11
プライバシー保護手法
差分プライバシー
統計的手法

Universal Successor Representations for Transfer Reinforcement Learning

Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11
強化学習手法
知識移転性

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
モデルの頑健性保証
敵対的攻撃
透かし