AIセキュリティポータルbot

Careful What You Wish For: on the Extraction of Adversarially Trained Models

Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21
Poisoning
Attack Method
Adversarial Example

One-vs-the-Rest Loss to Focus on Important Samples in Adversarial Training

Authors: Sekitoshi Kanai, Shin'ya Yamaguchi, Masanori Yamada, Hiroshi Takahashi, Kentaro Ohno, Yasutoshi Ida | Published: 2022-07-21 | Updated: 2023-04-26
Adversarial Example
Adaptive Adversarial Training
High Difficulty Sample

Digital Twin-based Intrusion Detection for Industrial Control Systems

Authors: Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos | Published: 2022-07-20
ML-Based IDS
Framework
Attack Method

FedNet2Net: Saving Communication and Computations in Federated Learning with Model Growing

Authors: Amit Kumar Kundu, Joseph Jaja | Published: 2022-07-19
Algorithm Design
Parameter Tuning
Model Design and Accuracy

Assaying Out-Of-Distribution Generalization in Transfer Learning

Authors: Florian Wenzel, Andrea Dittadi, Peter Vincent Gehler, Carl-Johann Simon-Gabriel, Max Horn, Dominik Zietlow, David Kernert, Chris Russell, Thomas Brox, Bernt Schiele, Bernhard Schölkopf, Francesco Locatello | Published: 2022-07-19 | Updated: 2022-10-21
Training Data Generation
Model Design and Accuracy
Statistical Methods

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19
Security Analysis
Expert Opinion Collection
Feature Importance Analysis

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning

Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19
Attack Methods against DFL
Privacy Enhancing Technology
Poisoning

FLAIR: Federated Learning Annotated Image Repository

Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18
Data Origins and Evolution
Evaluation of Technological Novelty
Hierarchical Classification Methods

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling

Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18
Algorithm Design
Security Assurance
State Estimation Method

Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications

Authors: Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl, Kim Duc Tran | Published: 2022-07-18 | Updated: 2025-03-25
Poisoning
Malicious Client
Detection of Poisonous Data