连词 发表于 2025-3-30 11:52:33

Training Set Camouflage,llicit machine learning classification task. Alice wants Bob (a machine learning system) to learn the task. However, sending either the training set or the trained model to Bob can raise suspicion if the communication is monitored. Training set camouflage allows Alice to compute a second training se

folliculitis 发表于 2025-3-30 13:08:23

Multi-stage Dynamic Information Flow Tracking Game,ersary gathers more privileges, resources, and information about the system and uses this information to gain access to the targeted data of the next stage to reach the final goal. APTs are not only persistent but also stealthy and hence difficult to detect. The persistent nature of APTs, however, c

拘留 发表于 2025-3-30 19:24:30

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks, architecture or augmenting the training set with adversarial examples, but both have inherent limitations. Motivated by recent research that shows outliers in the training set have a high negative influence on the trained model, we studied the relationship between model robustness and the quality o

间接 发表于 2025-3-30 23:02:24

http://reply.papertrans.cn/27/2644/264324/264324_54.png

syncope 发表于 2025-3-31 03:07:26

Perfectly Secure Message Transmission Against Rational Timid Adversaries,r using multiple channels. It is assumed that an adversary corrupts a subset of the channels, and makes eavesdropping and tampering over the corrupted channels. In this work, we consider a game-theoretic security model for SMT. Specifically, we introduce a rational adversary who has the preference f

Meander 发表于 2025-3-31 09:03:47

http://reply.papertrans.cn/27/2644/264324/264324_56.png

Coma704 发表于 2025-3-31 09:10:30

http://reply.papertrans.cn/27/2644/264324/264324_57.png

全国性 发表于 2025-3-31 15:01:45

Data Poisoning Attacks in Contextual Bandits,endation and adaptive medical treatment, among others. We provide a general attack framework based on convex optimization and show that by slightly manipulating rewards in the data, an attacker can force the bandit algorithm to pull a target arm for a target contextual vector. The target arm and tar

袭击 发表于 2025-3-31 21:01:52

Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cybthe attack. The multi-stage Bayesian game captures the incomplete information of the players’ type, and enables an adaptive belief update according to the observable history of the other player’s actions. The solution concept of perfect Bayesian Nash equilibrium (PBNE) under the proactive and reacti

grounded 发表于 2025-4-1 00:54:07

http://reply.papertrans.cn/27/2644/264324/264324_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Decision and Game Theory for Security; 9th International Co Linda Bushnell,Radha Poovendran,Tamer Başar Conference proceedings 2018 Springe