AIセキュリティポータルbot

How many dimensions are required to find an adversarial example?

Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11
収束特性
敵対的サンプル
機械学習技術

Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense

Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18
DNN IP保護手法
プロンプトインジェクション
機械学習技術

A survey on hardware-based malware detection approaches

Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18
HPCの課題
サイバーセキュリティ
機械学習技術

Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows

Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22
センサアレイ設計
機械学習手法
状態推定手法

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03
サイバーセキュリティ
メンバーシップ推論
機械学習技術

It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness

Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17
データ収集
モデル性能評価
機械学習の基礎

The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11
DNN IP保護手法
ポイズニング
深層学習手法

Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13
プライバシー保護技術
リスク評価手法
収束特性

A Survey on Explainable Artificial Intelligence for Cybersecurity

Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11
XAI(説明可能なAI)
サイバーセキュリティ
説明可能性

Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks

Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06
データ汚染検出
ポイズニング
ポイズニング攻撃