Malicious code within model detection method based on model similarity
The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheles...
Saved in:
Main Authors: | Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023056 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Deep visualization classification method for malicious code based on Ngram-TFIDF
by: WANG Jinwei, et al.
Published: (2024-06-01) -
Review of iOS malicious application analysis
by: Yixiang ZHU, et al.
Published: (2017-02-01) -
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
by: Binglong LI, et al.
Published: (2021-08-01) -
Colluding clique detector based on activity similarity in P2P trust model
by: MIAO Guang-sheng, et al.
Published: (2009-01-01) -
Fuzzy reasoning model for analysis of program maliciousness
by: FU Wen, et al.
Published: (2010-01-01)