研究方法論

A Systematic Literature Review on Phishing and Anti-Phishing Techniques

Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02
フィッシング攻撃
フィッシング検出
研究方法論

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30
データ生成手法
機械学習手法
研究方法論

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26
データラベリングの課題
機械学習アルゴリズム
研究方法論

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01
スパム検出手法
ユーザー行動分析
研究方法論

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
ロバスト性とプライバシーの関係
敵対的サンプルの脆弱性
研究方法論

Black-box Adversarial Sample Generation Based on Differential Evolution

Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30
攻撃手法
深層学習
研究方法論

Enhancing Certified Robustness via Smoothed Weighted Ensembling

Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23
アルゴリズム
一般化性能
研究方法論

Secondary Use of Electronic Health Record: Opportunities and Challenges

Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26
プライバシー保護技術
研究方法論
臨床研究

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
敵対的学習
敵対的攻撃検出
研究方法論

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26
ポイズニング
敵対的サンプル
研究方法論