AIセキュリティポータルbot

Enabling Homomorphically Encrypted Inference for Large DNN Models

Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29
メモリゼーションの測定
暗号化手法
最適化手法

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30
データ前処理
悪意のある行為者の分類
機械学習手法

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23
敵対的サンプルの脆弱性
異常検出手法
脅威モデリング

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29
モデル保護手法
敵対的サンプルの脆弱性
防御メカニズム

Privacy and Trust Redefined in Federated Machine Learning

Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan | Published: 2021-03-29 | Updated: 2021-03-30
データ管理システム
プライバシー侵害
検証可能な資格情報

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Authors: Iqbal H. Sarker | Published: 2021-03-28
マルチクラス分類
モデル選択手法
機械学習技術

Graph Unlearning

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16
データ管理システム
収束特性
最適化手法

Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks

Authors: Curtis G. Northcutt, Anish Athalye, Jonas Mueller | Published: 2021-03-26 | Updated: 2021-11-07
データキュレーション
ラベル推論攻撃
性能評価指標

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26
モデル保護手法
脆弱性評価手法
防御メカニズム

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25
敵対的サンプルの脆弱性
最適化手法
無線チャネル検出