AIセキュリティポータルbot

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19
Adversarial Example
Adversarial Example Detection
Defense Mechanism

Ponzi Scheme Detection in EthereumTransaction Network

Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17
Data Preprocessing
Blockchain Economics
Crime Detection

Orthogonalizing Convolutional Layers with the Cayley Transform

Authors: Asher Trockman, J. Zico Kolter | Published: 2021-04-14
Model Design
Resource optimization
Machine Learning Technology

Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption

Authors: Jing Ma, Si-Ahmed Naas, Stephan Sigg, Xixiang Lyu | Published: 2021-04-14
Privacy Protection
Distributed Learning
Encryption Technology

Defending Against Adversarial Denial-of-Service Data Poisoning Attacks

Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30
Backdoor Attack
Poisoning
Poisoning Attack

BROADCAST: Reducing Both Stochastic and Compression Noise to Robustify Communication-Efficient Federated Learning

Authors: Heng Zhu, Qing Ling | Published: 2021-04-14 | Updated: 2022-04-11
Byzantine Consensus Mechanism
Convergence Analysis
Optimization Problem

Towards Causal Federated Learning For Enhanced Robustness and Privacy

Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14
Privacy Protection
Poisoning
Threat Model

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13
Poisoning Attack
Threat Model
Defense Mechanism

Balboa: Bobbing and Weaving around Network Censorship

Authors: Marc B. Rosen, James Parker, Alex J. Malozemoff | Published: 2021-04-13
Watermarking
Communication Analysis
Speech Synthesis Technology

Sparse Coding Frontend for Robust Neural Networks

Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12
Poisoning
Adversarial Example Detection
Defense Mechanism