AIセキュリティポータルbot

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks

Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13
ポイズニング
敵対的攻撃手法
脆弱性攻撃手法

Adversarial Perturbations Fool Deepfake Detectors

Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15
敵対的サンプル
敵対的攻撃手法
防御手法

Systematic Evaluation of Privacy Risks of Machine Learning Models

Authors: Liwei Song, Prateek Mittal | Published: 2020-03-24 | Updated: 2020-12-09
プライバシー保護手法
メンバーシップ推論
防御手法

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08
トレーニング手法
プライバシー保護手法
ユーザー活動解析

FTT-NAS: Discovering Fault-Tolerant Convolutional Neural Architecture

Authors: Xuefei Ning, Guangjun Ge, Wenshuo Li, Zhenhua Zhu, Yin Zheng, Xiaoming Chen, Zhen Gao, Yu Wang, Huazhong Yang | Published: 2020-03-20 | Updated: 2021-04-12
ロバスト性
脆弱性検出
重み更新手法

One Neuron to Fool Them All

Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09
トレーニング手法
ロバスト性
敵対的サンプル

Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14
トレーニング手法
ハイパーパラメータ最適化
ロバスト性

RAB: Provable Robustness Against Backdoor Attacks

Authors: Maurice Weber, Xiaojun Xu, Bojan Karlaš, Ce Zhang, Bo Li | Published: 2020-03-19 | Updated: 2023-08-03
バックドア攻撃
ロバスト性
敵対的サンプル

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication

Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19
エラー訂正コード
トレーニング手法
プライバシー保護手法

Deep Quaternion Features for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang | Published: 2020-03-18 | Updated: 2020-06-21
DNN IP保護手法
プライバシー保護手法
量子暗号技術