AIセキュリティポータルbot

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22
攻撃者の行動分析
脆弱性分析
脆弱性検出

Multi-party Secure Broad Learning System for Privacy Preserving

Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22
アルゴリズム設計
セキュアな通信チャネル
特徴抽出手法

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22
DNN IP保護手法
敵対的学習
評価手法

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20
アルゴリズム設計
特徴抽出手法
評価手法

sqSGD: Locally Private and Communication Efficient Federated Learning

Authors: Yan Feng, Tao Xiong, Ruofan Wu, LingJuan Lv, Leilei Shi | Published: 2022-06-21 | Updated: 2022-06-22
LDPメカニズム
アルゴリズム設計
分散学習の効率

The Privacy Onion Effect: Memorization is Relative

Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22
メンバーシップ推論
ラベル推論攻撃
敵対的学習

The Role of Machine Learning in Cybersecurity

Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20
商用ML製品の問題
敵対的サンプル
機械学習の役割

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
一般化の影響
性能評価
敵対的サンプル

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
アルゴリズム設計
敵対的サンプル
敵対的攻撃検出

I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences

Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06
ポイズニング
メンバーシップ推論
敵対的攻撃手法