Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy 2022
DOI: 10.1145/3508398.3511497
|View full text |Cite
|
Sign up to set email alerts
|

Toward Deep Learning Based Access Control

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…In addition, [8] points out that these methods do not offer convergence on large datasets. Some authors have employed nonsymbolic classifiers such as support vector machines (SVMs) [11] and neural networks [18] for mining large datasets, but they are difficult to train when categorical values of logs are anonymized and granted entries outnumber the denied ones.…”
Section: Abac Rule Extractionmentioning
confidence: 99%
“…In addition, [8] points out that these methods do not offer convergence on large datasets. Some authors have employed nonsymbolic classifiers such as support vector machines (SVMs) [11] and neural networks [18] for mining large datasets, but they are difficult to train when categorical values of logs are anonymized and granted entries outnumber the denied ones.…”
Section: Abac Rule Extractionmentioning
confidence: 99%
“…Similarly to BC, DRL has experienced exponential growth in the last decade [20,21], and there is currently strong interest in exploring the use of DRL to improve SC network performance (Table 1) [22][23][24][25][26]; however, [22] is the only work reported in the literature that introduces a distributed collaborative dynamic access control scheme utilizing DRL, and redefining network security architecture by combining anomaly detection, dynamic updates to user trust profiles, and collaborative adjustments for mitigation policies, to the best of authors knowledge. This scheme addresses the escalating challenge of insider threats in network security.…”
Section: Related Workmentioning
confidence: 99%
“…The main contributions of this paper are as follows: Introduction of federated learning into ACP recognition technology, constructing a privacy-preserving authorized ACP recognition framework. Enhancement of ACP recognition capability in a distributed environment by incorporating pre-trained word embeddings from Natural Language Processing (NLP) [ 17 ] into federated learning. Experimental results validate the effectiveness of the proposed model in significantly improving the accuracy of authorized ACP recognition while ensuring data privacy and security.…”
Section: Introductionmentioning
confidence: 99%
“…Enhancement of ACP recognition capability in a distributed environment by incorporating pre-trained word embeddings from Natural Language Processing (NLP) [ 17 ] into federated learning.…”
Section: Introductionmentioning
confidence: 99%