AIセキュリティポータルbot

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22
DNN IP Protection Method
Adversarial Learning
Evaluation Method

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20
Algorithm Design
Feature Extraction Method
Evaluation Method

sqSGD: Locally Private and Communication Efficient Federated Learning

Authors: Yan Feng, Tao Xiong, Ruofan Wu, LingJuan Lv, Leilei Shi | Published: 2022-06-21 | Updated: 2022-06-22
LDP Mechanism
Algorithm Design
Efficiency of Distributed Learning

The Privacy Onion Effect: Memorization is Relative

Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22
Membership Inference
Label Inference Attack
Adversarial Learning

The Role of Machine Learning in Cybersecurity

Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20
Issues with Commercial ML Products
Adversarial Example
Role of Machine Learning

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
Impact of Generalization
Performance Evaluation
Adversarial Example

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
Algorithm Design
Adversarial Example
Adversarial Attack Detection

I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences

Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06
Poisoning
Membership Inference
Adversarial Attack Methods

Deepfake histological images for enhancing digital pathology

Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16
Algorithm
Threats of Medical AI
Performance Evaluation

On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits

Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16
Algorithm
Online Decision Making
Performance Evaluation