AIセキュリティポータルbot

Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning

Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12
Privacy Protection Method
Model Selection
Condition Monitoring

On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28
Subpopulation Characteristics
Membership Disclosure Risk
Adversarial Example

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31
Privacy Protection Method
Privacy Assessment
Face Recognition Method

Pareto Regret Analyses in Multi-objective Multi-armed Bandit

Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30
Algorithm Design
Online Learning
Optimization Problem

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22
Watermarking
Privacy Protection Method
Reconstruction Durability

Hijack Vertical Federated Learning Models As One Party

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16
Adversarial Example
Optimization Problem
Untargeted Toxicity Attack

Tight Certification of Adversarially Trained Neural Networks via Nonconvex Low-Rank Semidefinite Relaxations

Authors: Hong-Ming Chiu, Richard Y. Zhang | Published: 2022-11-30 | Updated: 2023-06-14
Watermarking
Optimization Problem
Optimization Methods

Targets in Reinforcement Learning to solve Stackelberg Security Games

Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30
Algorithm Design
Stacking Model
Security Assurance

Traditional Classification Neural Networks are Good Generators: They are Competitive with DDPMs and GANs

Authors: Guangrun Wang, Philip H. S. Torr | Published: 2022-11-27 | Updated: 2022-12-08
Watermarking
Optimization Problem
Optimization Methods

SoK: Secure Human-centered Wireless Sensing

Authors: Wei Sun, Tingjun Chen, Neil Gong | Published: 2022-11-22 | Updated: 2024-03-09
Privacy Protection Method
Signal Analysis
Wireless Channel Detection