A Survey on Data-driven Software Vulnerability Assessment and Prioritization Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04 データ駆動型脆弱性評価マルチクラス分類脆弱性評価手法 2021.07.18 2025.04.03 文献データベース
Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30 データ汚染検出敵対的攻撃脆弱性評価手法 2021.06.05 2025.04.03 文献データベース
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31 リスク管理脆弱性評価手法防御メカニズム 2021.05.31 2025.04.03 文献データベース
Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11 敵対的訓練脆弱性評価手法計算効率 2021.05.31 2025.04.03 文献データベース
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 ポイズニング敵対的攻撃脆弱性評価手法 2021.05.30 2025.04.03 文献データベース
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 プライバシー保護手法情報理論的評価脆弱性評価手法 2021.05.27 2025.04.03 文献データベース
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 データ汚染検出ポイズニング脆弱性評価手法 2021.05.26 2025.04.03 文献データベース
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 ポイズニング最適化手法脆弱性評価手法 2021.05.23 2025.04.03 文献データベース
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 モデル保護手法脆弱性評価手法防御メカニズム 2021.03.26 2025.04.03 文献データベース
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 最適化手法脆弱性評価手法防御メカニズム 2021.03.24 2025.04.03 文献データベース