性能評価手法

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
プライバシー保護プロトコル
性能評価手法
透かし設計

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16
プライバシー保護プロトコル
性能評価手法
連合学習

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31
データ収集手法
ネットワークトラフィック分析
性能評価手法

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17
ポイズニング
モデル評価
性能評価手法

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15
クエリ生成手法
性能評価手法
敵対的訓練

Online Multivariate Anomaly Detection and Localization for High-dimensional Settings

Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14
DDoS攻撃
性能評価手法
高次元データ分析

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16
データ前処理
性能評価手法
攻撃チェーン分析

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic

Authors: Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng | Published: 2019-05-15 | Updated: 2019-12-17
UAVセキュリティ
性能評価手法
機械学習の役割

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14
バックドア攻撃用の毒データの検知
ポイズニング
性能評価手法