機械学習の応用

Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning

Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19
アルゴリズム
機械学習の応用
線形モデル

An automatic differentiation system for the age of differential privacy

Authors: Dmitrii Usynin, Alexander Ziller, Moritz Knolle, Andrew Trask, Kritika Prakash, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2022-04-05
データプライバシー評価
プライバシーリスク管理
機械学習の応用

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
性能評価
機械学習の応用
異常検出手法

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
サイバーセキュリティ
データ抽出と分析
機械学習の応用

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02
プライバシー手法
モデルアーキテクチャ
機械学習の応用

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26
ハードウェア設計
機械学習の応用
防御メカニズム

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23
攻撃の評価
機械学習の応用
機械学習技術

Machine Learning for Malware Evolution Detection

Authors: Lolitha Sresta Tupadha, Mark Stamp | Published: 2021-07-04
マルウェア進化
機械学習の応用
機械学習技術

Residual Error: a New Performance Measure for Adversarial Robustness

Authors: Hossein Aboutalebi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger, Alexander Wong | Published: 2021-06-18
モデルの設計や精度
分類パターン分析
機械学習の応用

Bad Characters: Imperceptible NLP Attacks

Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11
サイバー攻撃
プロンプトインジェクション
機械学習の応用