all InfoSec news
Integrity Authentication in Tree Models. (arXiv:2205.15444v2 [cs.CR] UPDATED)
June 24, 2022, 1:20 a.m. | Weijie Zhao, Yingjie Lao, Ping Li
cs.CR updates on arXiv.org arxiv.org
Tree models are very widely used in practice of machine learning and data
mining. In this paper, we study the problem of model integrity authentication
in tree models. In general, the task of model integrity authentication is the
design \& implementation of mechanisms for checking/detecting whether the model
deployed for the end-users has been tampered with or compromised, e.g.,
malicious modifications on the model. We propose an authentication framework
that enables the model builders/distributors to embed a signature to the …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India