データ収集手法

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31
データ収集手法
ネットワークトラフィック分析
性能評価手法

Automatically Dismantling Online Dating Fraud

Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty | Published: 2019-05-29 | Updated: 2019-05-30
データセット分析
データ収集手法
プロフィール特性分析

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28
データ収集手法
攻撃の評価
機械学習

Machine Learning Cryptanalysis of a Quantum Random Number Generator

Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13
データ収集手法
機械学習手法
量子計算

Cognitive Triaging of Phishing Attacks

Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29
データ収集手法
ポイズニング
攻撃シナリオ分析

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24
データ収集手法
マルウェア検出
犯罪行為検出

Detecting ADS-B Spoofing Attacks using Deep Neural Networks

Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22
DNNベースのメッセージ分類器
データ収集手法
深層学習技術

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data

Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02
データ収集手法
音声強化技術
音声認識システム

Online Feature Ranking for Intrusion Detection Systems

Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15
MLベースのIDS
データ収集手法
機械学習技術

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22
データ収集手法
特徴選択
認証技術