咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 14 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 1 篇 化学工程与技术
    • 1 篇 安全科学与工程
  • 11 篇 理学
    • 6 篇 数学
    • 3 篇 生物学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 generative adver...
  • 3 篇 machine learning
  • 2 篇 anomaly detectio...
  • 1 篇 support vector m...
  • 1 篇 electric lines
  • 1 篇 neural networks
  • 1 篇 learning algorit...
  • 1 篇 convolution
  • 1 篇 smart contract
  • 1 篇 embeddings
  • 1 篇 blockchain
  • 1 篇 recurrent neural...

机构

  • 5 篇 st electronics -...
  • 3 篇 st engineering-s...
  • 2 篇 st engineering e...
  • 2 篇 information syst...
  • 2 篇 st electronics s...
  • 2 篇 school of inform...
  • 2 篇 pillar singapore...
  • 2 篇 cooperative chin...
  • 2 篇 department of so...
  • 2 篇 department of in...
  • 2 篇 st engineering-s...
  • 1 篇 department of so...
  • 1 篇 penang malaysia
  • 1 篇 computational co...
  • 1 篇 deutsche telekom...
  • 1 篇 kotel'nikov inst...
  • 1 篇 center for cyber...
  • 1 篇 jinan university...
  • 1 篇 st electronics -...
  • 1 篇 data assurance a...

作者

  • 10 篇 cheung ngai-man
  • 6 篇 tan yi xiang mar...
  • 6 篇 binder alexander
  • 6 篇 elovici yuval
  • 5 篇 tran ngoc-trung
  • 3 篇 bui tuan-anh
  • 3 篇 sun jiamei
  • 3 篇 chong penny
  • 2 篇 yin hongzhi
  • 2 篇 hosseini saeid
  • 2 篇 szalachowski paw...
  • 1 篇 alangot bithin
  • 1 篇 s b klyuev
  • 1 篇 kangavari mohamm...
  • 1 篇 nguyen ngoc-bao
  • 1 篇 yuval elovici
  • 1 篇 manickam selvaku...
  • 1 篇 guo yiluan
  • 1 篇 loo yi
  • 1 篇 singh parminder

语言

  • 20 篇 英文
检索条件"机构=ST Engineering Electronics-SUTD Cyber Security Laboratory"
20 条 记 录,以下是1-10 订阅
排序:
Analysing the Adversarial Landscape of Binary stochastic Networks  1
收藏 引用
iCatse International Conference on Information Science and Applications, ICISA 2020
作者: Tan, Yi Xiang Marcus Elovici, Yuval Binder, Alexander ST Engineering-SUTD Cyber Security Laboratory Singapore Singapore Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
We investigate the robustness of stochastic ANNs to adversarial attacks. We perform experiments on three known datasets. Our experiments reveal similar susceptibility of stochastic ANNs compared to conventional ANNs w... 详细信息
来源: 评论
Detection of Adversarial Supports in Few-Shot Classifiers Using Self-Similarity and Filtering
Detection of Adversarial Supports in Few-Shot Classifiers Us...
收藏 引用
2021 International Workshop on Safety and security of Deep Learning, SSDL 2021
作者: Tan, Yi Xiang Marcus Chong, Penny Sun, Jiamei Cheung, Ngai-Man Elovici, Yuval Binder, Alexander Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Be’er Sheva Israel Department of Informatics University of Oslo Norway ST Engineering-SUTD Cyber Security Laboratory
Few-shot classifiers excel under limited training samples, making them useful in applications with sparsely user-provided labels. Their unique relative prediction setup offers opportunities for novel attacks, such as ... 详细信息
来源: 评论
SmartWitness: A proactive software transparency system using smart contracts  2
SmartWitness: A proactive software transparency system using...
收藏 引用
2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2020, Co-located with AsiaCCS 2020
作者: Guarnizo, Juan Alangot, Bithin Szalachowski, Pawel ST Engineering-SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore Singapore Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Package managers have become essential for software distribution and management. Their goal is to allow users to install programs, drivers, or updates in their systems in a secure, quick, and often, unattended way. Ho... 详细信息
来源: 评论
Improving GAN with neighbors embedding and gradient matching  33
Improving GAN with neighbors embedding and gradient matching
收藏 引用
33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Annual Conference on Innovative Applications of Artificial Intelligence, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019
作者: Tran, Ngoc-Trung Bui, Tuan-Anh Cheung, Ngai-Man ST Electronics - SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore
We propose two new techniques for training Generative Adversarial Networks (GANs) in the unsupervised setting. Our objectives are to alleviate mode collapse in GAN and improve the quality of the generated samples. Fir... 详细信息
来源: 评论
An improved self-supervised GAN via adversarial training
arXiv
收藏 引用
arXiv 2019年
作者: Tran, Ngoc-Trung Tran, Viet-Hung Nguyen, Ngoc-Bao Cheung, Ngai-Man ST Electronics - SUTD Cyber Security Laboratory Singapore University of Technology and Design
We propose to improve unconditional Generative Adversarial Networks (GAN) by training the self-supervised learning with the adversarial process. In particular, we apply self-supervised learning via the geometric trans... 详细信息
来源: 评论
Detection of adversarial supports in few-shot classifiers using self-similarity and filtering
arXiv
收藏 引用
arXiv 2020年
作者: Tan, Yi Xiang Marcus Chong, Penny Sun, Jiamei Cheung, Ngai-Man Elovici, Yuval Binder, Alexander ST Engineering-SUTD Cyber Security Laboratory ISTD pillar Singapore University of Technology and Design Singapore Department of Software and Information Systems Engineering Ben-Gurion University Israel Department of Informatics University of Oslo Norway
Few-shot classifiers excel under limited training samples, making them useful in applications with sparsely user-provided labels. Their unique relative prediction setup offers opportunities for novel attacks, such as ... 详细信息
来源: 评论
A Neural Attention Model for Real-Time Network Intrusion Detection
A Neural Attention Model for Real-Time Network Intrusion Det...
收藏 引用
Conference on Local Computer Networks (LCN)
作者: Mengxuan Tan Alfonso Iacovazzi Ngai-Man Man Cheung Yuval Elovici ST Engineering-SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore
The diversity and ever-evolving nature of network intrusion attacks has made defense a real challenge for security practitioners. Recent research in the domain of Network-based Intrusion Detection System has mainly fo...
来源: 评论
Comparative analysis of state-of-the-art EDoS mitigation techniques in cloud computing environment
arXiv
收藏 引用
arXiv 2019年
作者: Singh, Parminder Rehman, Shafiq Ul Manickam, Selvakumar Penang Malaysia ST Engineering Electronics - SUTD Cyber Security Laboratory Singapore 8 Somapah Road Singapore487372 Singapore
A new variant of the DDoS attack, called Economic Denial of Sustainability (EDoS) attack has emerged. Since the cloud service is based on the pay-per-use model, the EDoS attack endeavors to scale up the resource usage... 详细信息
来源: 评论
Permissionless Blockchains and Secure Logging
arXiv
收藏 引用
arXiv 2019年
作者: Ge, Chunpeng Sun, Siwei Szalachowski, Pawel St Electronics-SUTD Cyber Security Laboratory Singapore University of Technology and Design Data Assurance and Communication Security Research Center Cas
The blockchain technology enables mutu-ally untrusting participants to reach consensus on the state of a distributed and decentralized ledger (called a blockchain) in a permissionless setting. The consensus protocol o... 详细信息
来源: 评论
Exploring the back alleys: Analysing the robustness of alternative neural network architectures against adversarial attacks
arXiv
收藏 引用
arXiv 2019年
作者: Tan, Yi Xiang Marcus Elovici, Yuval Binder, Alexander ST Engineering Electronics-SUTD Cyber Security Laboratory Pillar Singapore University of Technology and Design Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Deutsche Telekom Innovation Laboratories Ben-Gurion University of the Negev
Recent discoveries in the field of adversarial machine learning have shown that Artificial Neural Networks (ANNs) are susceptible to adversarial attacks. These attacks cause misclassification of specially crafted adve... 详细信息
来源: 评论