攻撃検出

Robustness Verification for Classifier Ensembles

Authors: Dennis Gross, Nils Jansen, Guillermo A. Pérez, Stephan Raaijmakers | Published: 2020-05-12 | Updated: 2020-07-09
ロバスト性向上手法
攻撃検出
深層学習

Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data

Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10
アルゴリズム
攻撃検出
敵対的訓練

Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach

Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06
エネルギー管理
ロバスト性向上手法
攻撃検出

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28
攻撃検出
敵対的攻撃検出
防御効果分析

Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey

Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11
セキュリティ分析
攻撃の評価
攻撃検出

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
攻撃の評価
攻撃検出
防御手法

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms

Authors: Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi | Published: 2019-12-08
攻撃検出
機械学習技術
産業制御システム

AutoIDS: Auto-encoder Based Method for Intrusion Detection System

Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08
セキュリティメトリック
攻撃検出
機械学習の基礎

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06
プロセス分割手法
攻撃タイプ
攻撃検出

Network entity characterization and attack prediction

Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17
データ選択戦略
攻撃検出
機械学習手法