性能評価

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
性能評価
攻撃の評価
機械学習手法

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08
マルウェア検出手法
性能評価
通信解析

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01
予測の安定性
性能評価
機械学習手法

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27
データセット生成
性能評価
機械学習

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26
性能評価
攻撃手法
音声認識プロセス

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
一般化の影響
性能評価
敵対的サンプル

Deepfake histological images for enhancing digital pathology

Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16
アルゴリズム
医療AIの脅威
性能評価

On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits

Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16
アルゴリズム
オンライン意思決定
性能評価

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18
メンバーシップ推論
性能評価
攻撃検出

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18
DFLに対する攻撃手法
バックドア攻撃
性能評価