AIセキュリティポータルbot

Interpretability Beyond Feature Attribution: Quantitative Testing with Concept Activation Vectors (TCAV)

Authors: Been Kim, Martin Wattenberg, Justin Gilmer, Carrie Cai, James Wexler, Fernanda Viegas, Rory Sayres | Published: 2017-11-30 | Updated: 2018-06-07
XAI(説明可能なAI)
深層学習手法
特徴重要度分析

AttGAN: Facial Attribute Editing by Only Changing What You Want

Authors: Zhenliang He, Wangmeng Zuo, Meina Kan, Shiguang Shan, Xilin Chen | Published: 2017-11-29 | Updated: 2018-07-25
データ生成
ディープフェイク
画像処理

No Classification without Representation: Assessing Geodiversity Issues in Open Data Sets for the Developing World

Authors: Shreya Shankar, Yoni Halpern, Eric Breck, James Atwood, Jimbo Wilson, D. Sculley | Published: 2017-11-22
データ生成
学習データのバイアス排除
学習データの偏り

Adversarial Phenomenon in the Eyes of Bayesian Deep Learning

Authors: Ambrish Rawat, Martin Wistuba, Maria-Irina Nicolae | Published: 2017-11-22
ベイズ深層学習
敵対的サンプル
敵対的攻撃手法

Generative Adversarial Positive-Unlabelled Learning

Authors: Ming Hou, Brahim Chaib-draa, Chao Li, Qibin Zhao | Published: 2017-11-21 | Updated: 2018-04-04
機械学習アルゴリズム
機械学習の応用
生成モデル特性

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis

Authors: Guozhu Meng, Yinxing Xue, Jing Kai Siow, Ting Su, Annamalai Narayanan, Yang Liu | Published: 2017-11-20 | Updated: 2017-11-21
データセット統合
機械学習の応用
知識抽出

Evaluating Robustness of Neural Networks with Mixed Integer Programming

Authors: Vincent Tjeng, Kai Xiao, Russ Tedrake | Published: 2017-11-20 | Updated: 2019-02-18
モデルの頑健性保証
ロバスト性
深層学習技術

Model Extraction Warning in MLaaS Paradigm

Authors: Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta | Published: 2017-11-20
モデル抽出攻撃
モデル抽出攻撃の検知
情報漏洩分析

Hardening Quantum Machine Learning Against Adversaries

Authors: Nathan Wiebe, Ram Shankar Siva Kumar | Published: 2017-11-17
モデル抽出攻撃の検知
近似計算
量子機械学習

Enhanced Attacks on Defensively Distilled Deep Neural Networks

Authors: Yujia Liu, Weiming Zhang, Shaohua Li, Nenghai Yu | Published: 2017-11-16
ロバスト性向上
敵対的サンプル
敵対的攻撃分析