特徴抽出手法

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
性能評価
機械学習手法
特徴抽出手法

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02
データ収集
特徴抽出手法
脆弱性検出

Towards a Universal Features Set for IoT Botnet Attacks Detection

Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01
DDoS攻撃
MLベースのIDS
特徴抽出手法

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19
デバイス識別手法
機械学習
特徴抽出手法

Rotation-Equivariant Neural Networks for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21
機械学習アルゴリズム
特徴抽出手法
透かし技術

Adversarial Feature Selection against Evasion Attacks

Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25
ポイズニング
敵対的攻撃
特徴抽出手法

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25
機械学習
機械学習技術
特徴抽出手法

TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations

Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25
データ保護手法
プライバシー評価
特徴抽出手法

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking

Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal | Published: 2020-05-17 | Updated: 2021-03-31
ロバスト性分析
敵対的攻撃
特徴抽出手法

A Review of Computer Vision Methods in Network Security

Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne | Published: 2020-05-07
マルウェア分類
検出手法の分析
特徴抽出手法