Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Registration
Program Agenda
Suggested Reading
Venue / Travel
Challenge Problems
Workshop Archives
Files
CPS-VO
»
Computational Cybersecurity in Compromised Environments (C3E)
» EXTRACTION
Extraction
biblio
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective
Submitted by Katie Dey on Mon, 08/06/2018 - 12:27pm
face spoofing attack
Signal processing algorithms
security
Pattern recognition
machine-learning
machine learning algorithms
machine learning
learning (artificial intelligence)
image recognition
feature extraction
adaptive face-recognition system
Extraction
biometrics (access control)
biometric systems
biometric system security
biometric security
biometric recognition systems
Behavioral science
adversarial biometric recognition
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Causal Connections Mining Within Security Event Logs
Submitted by Katie Dey on Mon, 08/06/2018 - 12:26pm
Association
automated
Causal
Knowledge extraction
Extraction
biblio
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
Android malware
dimensional
feature extraction
probability statistics
SVM
Extraction
biblio
Machine Learning Cryptanalysis of a Quantum Random Number Generator
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
convolution
cryptoanalysis
Cryptography
Entropy
feature extraction
Generators
machine learning
Quantum random number generator
Training
Extraction
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 12:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019