AIセキュリティポータルbot

Scalable Private Learning with PATE

Authors: Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson | Published: 2018-02-24
プライバシー手法
差分プライバシー
距離回復アルゴリズム

The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks

Authors: Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song | Published: 2018-02-22 | Updated: 2019-07-16
プライバシー保護メカニズム
差分プライバシー
情報理論的評価

Asynchronous Byzantine Machine Learning (the case of SGD)

Authors: Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, Mahsa Taziki | Published: 2018-02-22 | Updated: 2018-07-09
動的なビザンチン行動に対処する手法
機械学習手法
適応学習率

The Hidden Vulnerability of Distributed Learning in Byzantium

Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17
ポイズニング
敵対的攻撃
機械学習手法

Adversarial Training for Probabilistic Spiking Neural Networks

Authors: Alireza Bagheri, Osvaldo Simeone, Bipin Rajendran | Published: 2018-02-22 | Updated: 2018-02-26
スパイキングニューラルネットワーク
敵対的学習
敵対的訓練

Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning

Authors: Christopher Frederickson, Michael Moore, Glenn Dawson, Robi Polikar | Published: 2018-02-20
ポイズニング
敵対的サンプルの検知
敵対的攻撃

Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Siwei Li, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-02-19
モデルの頑健性保証
敵対的攻撃
機械学習手法

Are Generative Classifiers More Robust to Adversarial Attacks?

Authors: Yingzhen Li, John Bradshaw, Yash Sharma | Published: 2018-02-19 | Updated: 2019-05-27
ロバスト性評価
敵対的学習
敵対的攻撃

Actions Speak Louder Than Goals: Valuing Player Actions in Soccer

Authors: Tom Decroos, Lotte Bransen, Jan Van Haaren, Jesse Davis | Published: 2018-02-18 | Updated: 2019-07-10
プライバシー管理
ユーザー行動分析
機械学習手法

WebEye – Automated Collection of Malicious HTTP Traffic

Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16
データ収集
ユーザー活動解析
悪意のあるウェブサイト検出