DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 213
1.
  • TableGAN-MCA: Evaluating Me... TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing
    Hu, Aoting; Xie, Renjie; Lu, Zhigang ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 11/2021
    Conference Proceeding
    Odprti dostop

    Generative Adversarial Networks (GAN)-synthesized table publishing lets people privately learn insights without access to the private table. However, existing studies on Membership Inference (MI) ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • Fake reviews tell no tales?... Fake reviews tell no tales? dissecting click farming in content-generated social networks
    Li, Neng; Du, Suguo; Zheng, Haizhong ... China communications, 04/2018, Letnik: 15, Številka: 4
    Journal Article
    Recenzirano

    Recently, there has been a radial shift from traditional online social networks to content-generated social networks (CGSNs). Contemporary CGSNs, such as Dianping and TripAdvisor, are often the ...
Celotno besedilo
Dostopno za: UL
3.
  • Explainability-based Backdo... Explainability-based Backdoor Attacks Against Graph Neural Networks
    Xu, Jing; Xue, Minhui (Jason); Picek, Stjepan Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 06/2021
    Conference Proceeding
    Odprti dostop

    Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • Modeling Privacy Leakage Ri... Modeling Privacy Leakage Risks in Large-Scale Social Networks
    Du, Suguo; Li, Xiaolong; Zhong, Jinli ... IEEE access, 01/2018, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • Automated poisoning attacks... Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
    Chen, Sen; Xue, Minhui; Fan, Lingling ... Computers & security, March 2018, 2018-03-00, 20180301, Letnik: 73
    Journal Article
    Recenzirano
    Odprti dostop

    The evolution of mobile malware poses a serious threat to smartphone security. Today, sophisticated attackers can adapt by maximally sabotaging machine-learning classifiers via polluting training ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • I know where you are: Thwarting privacy protection in location-based social discovery services
    Minhui Xue; Yong Liu; Ross, Keith W. ... 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 04/2015
    Conference Proceeding
    Odprti dostop

    Location-based Social Discovery (LBSD) services enable users to discover their geographic neighborhoods to make new friends. Original LBSD services were designed to provide the exact distances to ...
Celotno besedilo
Dostopno za: UL

PDF
7.
  • Invisible Backdoor Attacks ... Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization
    Li, Shaofeng; Xue, Minhui; Zhao, Benjamin Zi Hao ... IEEE Transactions on Dependable and Secure Computing/IEEE transactions on dependable and secure computing, 09/2021, Letnik: 18, Številka: 5
    Journal Article
    Odprti dostop

    Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called ...
Celotno besedilo
Dostopno za: UL

PDF
8.
  • DeepGauge: multi-granularit... DeepGauge: multi-granularity testing criteria for deep learning systems
    Ma, Lei; Juefei-Xu, Felix; Zhang, Fuyuan ... 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 09/2018
    Conference Proceeding
    Odprti dostop

    Deep learning (DL) defines a new data-driven programming paradigm that constructs the internal system logic of a crafted neuron network through a set of training data. We have seen wide adoption of ...
Celotno besedilo
Dostopno za: UL

PDF
9.
  • Hidden Backdoors in Human-C... Hidden Backdoors in Human-Centric Language Models
    Li, Shaofeng; Liu, Hui; Dong, Tian ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 11/2021
    Conference Proceeding

    Natural language processing (NLP) systems have been proven to be vulnerable to backdoor attacks, whereby hidden features (backdoors) are trained into a language model and may only be activated by ...
Celotno besedilo
Dostopno za: UL

PDF
10.
  • TnT Attacks! Universal Natu... TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems
    Doan, Bao Gia; Xue, Minhui; Ma, Shiqing ... IEEE transactions on information forensics and security, 2022, Letnik: 17
    Journal Article
    Recenzirano
    Odprti dostop

    Deep neural networks (DNNs), regardless of their impressive performance, are vulnerable to attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the decision of the model. ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 213

Nalaganje filtrov