AIセキュリティポータルbot

Differentially Private Shapley Values for Data Evaluation

Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01
Sample Complexity
Privacy Assessment
Loss Term

Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration

Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18
Malware Detection Method
Transaction Profit and Performance
Funding

Privacy for Free: How does Dataset Condensation Help Privacy?

Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01
Data Management System
Privacy Assessment
Loss Term

To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints?

Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31
Data Management System
Reduction of Communication Costs
Communication Model

Private Federated Submodel Learning with Sparsification

Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31
Data Management System
Privacy Assessment
Reduction of Communication Costs

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31
Membership Inference
Trust Evaluation
Communication Model

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23
Identification of Signature Key
Selection Method
Hierarchical Classification Methods

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30
Attack Methods against DFL
Adversarial Attack Methods

Evaluating Automated Driving Planner Robustness against Adversarial Influence

Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29
Cyber Threat
Trust Evaluation
Vehicle Network