AIセキュリティポータルbot

Federated Learning: Strategies for Improving Communication Efficiency

Authors: Jakub Konečný, H. Brendan McMahan, Felix X. Yu, Peter Richtárik, Ananda Theertha Suresh, Dave Bacon | Published: 2016-10-18 | Updated: 2017-10-30
通信コスト削減
連合学習
量子化とプライバシー

An arbiter PUF secured by remote random reconfigurations of an FPGA

Authors: Alexander Spenke, Ralph Breithaupt, Rainer Plaga | Published: 2016-10-12
FPGA
デバイス認証
モデル抽出攻撃に関連するリスク

Safe, Multi-Agent, Reinforcement Learning for Autonomous Driving

Authors: Shai Shalev-Shwartz, Shaked Shammah, Amnon Shashua | Published: 2016-10-11
フェールセーフ機構
強化学習アルゴリズム
深層学習手法

Equality of Opportunity in Supervised Learning

Authors: Moritz Hardt, Eric Price, Nathan Srebro | Published: 2016-10-07
モデル識別
公平性のあるAIモデルの作成
観察的公平性の測定

Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization

Authors: Ramprasaath R. Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, Dhruv Batra | Published: 2016-10-07 | Updated: 2019-12-03
XAI(説明可能なAI)
深層学習技術
画像キャプショニング

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Authors: Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar | Published: 2016-10-06
DGA検出手法
敵対的学習
深層ネットワークの堅牢性

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long, Patrick McDaniel | Published: 2016-10-03 | Updated: 2018-06-27
モデルの堅牢性
敵対的訓練
防御メカニズム

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

Authors: Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu | Published: 2016-09-10
セキュリティ分析手法
動的分析フレームワーク
特徴選択手法

Control Flow Change in Assembly as a Classifier in Malware Analysis

Authors: Andree Linke, Nhien-An Le-Khac | Published: 2016-09-09
データ抽出と分析
ベイズ分類
特徴選択手法

Stealing Machine Learning Models via Prediction APIs

Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart | Published: 2016-09-09 | Updated: 2016-10-03
モデル抽出攻撃
モデル抽出攻撃に関連するリスク
モデル抽出攻撃の検知