分類パターン分析

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
モデル抽出攻撃
分類パターン分析
敵対的サンプル

Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset

Authors: Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Assanka Sayakkara, Nhien-An Le-Khac | Published: 2023-10-04
ウォーターマーキング
クロスデバイス分析
分類パターン分析

Performance evaluation of Machine learning algorithms for Intrusion Detection System

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01
アルゴリズム
分類パターン分析
評価手法

Intrusion Detection: A Deep Learning Approach

Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13
LSTMモデル性能評価
分類パターン分析
自動化された侵入検知システム

Phishing URL Detection: A Network-based Approach Robust to Evasion

Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03
データセット生成
フィッシング検出
分類パターン分析

Lethal Dose Conjecture on Data Poisoning

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18
ロバスト性評価
分類パターン分析
機械学習手法

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
セキュリティ分析
データ選択戦略
分類パターン分析

Residual Error: a New Performance Measure for Adversarial Robustness

Authors: Hossein Aboutalebi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger, Alexander Wong | Published: 2021-06-18
モデルの設計や精度
分類パターン分析
機械学習の応用

Two Coupled Rejection Metrics Can Tell Adversarial Examples Apart

Authors: Tianyu Pang, Huishuai Zhang, Di He, Yinpeng Dong, Hang Su, Wei Chen, Jun Zhu, Tie-Yan Liu | Published: 2021-05-31 | Updated: 2022-03-31
ラベル不確実性
分類パターン分析
敵対的訓練

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27
MLベースのIDS
サイバー攻撃
分類パターン分析