June 24, 2022, 1:20 a.m. | Weijie Zhao, Yingjie Lao, Ping Li

cs.CR updates on arXiv.org arxiv.org

Tree models are very widely used in practice of machine learning and data
mining. In this paper, we study the problem of model integrity authentication
in tree models. In general, the task of model integrity authentication is the
design \& implementation of mechanisms for checking/detecting whether the model
deployed for the end-users has been tampered with or compromised, e.g.,
malicious modifications on the model. We propose an authentication framework
that enables the model builders/distributors to embed a signature to the …

authentication integrity

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India