连词 发表于 2025-3-30 11:52:33
Training Set Camouflage,llicit machine learning classification task. Alice wants Bob (a machine learning system) to learn the task. However, sending either the training set or the trained model to Bob can raise suspicion if the communication is monitored. Training set camouflage allows Alice to compute a second training sefolliculitis 发表于 2025-3-30 13:08:23
Multi-stage Dynamic Information Flow Tracking Game,ersary gathers more privileges, resources, and information about the system and uses this information to gain access to the targeted data of the next stage to reach the final goal. APTs are not only persistent but also stealthy and hence difficult to detect. The persistent nature of APTs, however, c拘留 发表于 2025-3-30 19:24:30
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks, architecture or augmenting the training set with adversarial examples, but both have inherent limitations. Motivated by recent research that shows outliers in the training set have a high negative influence on the trained model, we studied the relationship between model robustness and the quality o间接 发表于 2025-3-30 23:02:24
http://reply.papertrans.cn/27/2644/264324/264324_54.pngsyncope 发表于 2025-3-31 03:07:26
Perfectly Secure Message Transmission Against Rational Timid Adversaries,r using multiple channels. It is assumed that an adversary corrupts a subset of the channels, and makes eavesdropping and tampering over the corrupted channels. In this work, we consider a game-theoretic security model for SMT. Specifically, we introduce a rational adversary who has the preference fMeander 发表于 2025-3-31 09:03:47
http://reply.papertrans.cn/27/2644/264324/264324_56.pngComa704 发表于 2025-3-31 09:10:30
http://reply.papertrans.cn/27/2644/264324/264324_57.png全国性 发表于 2025-3-31 15:01:45
Data Poisoning Attacks in Contextual Bandits,endation and adaptive medical treatment, among others. We provide a general attack framework based on convex optimization and show that by slightly manipulating rewards in the data, an attacker can force the bandit algorithm to pull a target arm for a target contextual vector. The target arm and tar袭击 发表于 2025-3-31 21:01:52
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cybthe attack. The multi-stage Bayesian game captures the incomplete information of the players’ type, and enables an adaptive belief update according to the observable history of the other player’s actions. The solution concept of perfect Bayesian Nash equilibrium (PBNE) under the proactive and reactigrounded 发表于 2025-4-1 00:54:07
http://reply.papertrans.cn/27/2644/264324/264324_60.png