AIセキュリティポータルbot

EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling

Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24
トレーニングデータ生成
将来の研究
敵対的サンプル

Process Mining Algorithm for Online Intrusion Detection System

Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24
データ収集
ネットワーク脅威検出
攻撃タイプ

PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning

Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi | Published: 2022-05-23 | Updated: 2022-08-26
プライバシー手法
公平性評価
統計的手法

FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing

Authors: Helio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia C. Fernandes | Published: 2022-05-23
収束特性
性能評価指標
損失関数

Robust Quantity-Aware Aggregation for Federated Learning

Authors: Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie | Published: 2022-05-22 | Updated: 2023-07-26
DFLに対する攻撃手法
セキュアアグリゲーション
ロバスト性評価

Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification

Authors: Jungeum Kim, Xiao Wang | Published: 2022-05-20
ロバスト性評価
損失関数
敵対的サンプル

Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness

Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09
ロバスト性評価
敵対的サンプル
脅威モデル

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08
バックドア攻撃
メンバーシップ推論
ロバスト性評価

Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19
DFLに対する攻撃手法
攻撃タイプ
敵対的サンプル

Differential Privacy: What is all the noise about?

Authors: Roxana Danger | Published: 2022-05-19
DP-SGD
プライバシー手法
ポイズニング