脅威モデル

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07
プライバシー保護技術
ユーザ行動分析
脅威モデル

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
リスク管理
攻撃者の行動分析
脅威モデル

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
敵対的学習
敵対的攻撃
脅威モデル

Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness

Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09
ロバスト性評価
敵対的サンプル
脅威モデル

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21
イベントトレース分析
メンバーシップ推論
脅威モデル

Collaborative Information Sharing for ML-Based Threat Detection

Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23
プライバシー保護
機械学習技術
脅威モデル

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Authors: Vance Wong, John Emanuello | Published: 2021-04-21
MLベースのIDS
特徴エンジニアリング
脅威モデル

Towards Causal Federated Learning For Enhanced Robustness and Privacy

Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14
プライバシー保護
ポイズニング
脅威モデル

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13
ポイズニング攻撃
脅威モデル
防御メカニズム

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05
ポイズニング
医療データの透かし設定
脅威モデル