AIセキュリティポータルbot

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07
Risk Analysis Method
Adversarial Text Purification
Machine Learning

Malware Classification with Word Embedding Features

Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03
Multi-Class Classification
Membership Inference
Machine Learning

Graph Computing for Financial Crime and Fraud Detection: Trends, Challenges and Outlook

Authors: E. Kurshan, H. Shen | Published: 2021-03-02
Dynamic Graph Processing
Fraud Techniques
Financial Intelligence

Private Stochastic Convex Optimization: Optimal Rates in $\ell_1$ Geometry

Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar | Published: 2021-03-02
Privacy-Preserving Algorithm
Convergence Analysis
Computational Efficiency

Smoothness Analysis of Adversarial Training

Authors: Sekitoshi Kanai, Masanori Yamada, Hiroshi Takahashi, Yuki Yamanaka, Yasutoshi Ida | Published: 2021-03-02 | Updated: 2023-03-06
Data Dependency
Adversarial Example
Adversarial Spectrum Attack Detection

Adversarial Information Bottleneck

Authors: Penglong Zhai, Shihua Zhang | Published: 2021-02-28 | Updated: 2021-03-03
Model Performance Evaluation
Adversarial Example
Adversarial Training

Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

Authors: Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, Aun Irtaza | Published: 2021-02-25 | Updated: 2021-11-23
Deepfake Technology
Speech Synthesis Technology
Face Recognition

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24
Model Performance Evaluation
Trust Evaluation Module
Adversarial Example Detection

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29
Malware Detection Method
Adversarial Example
Adversarial Example Detection

Learner-Private Convex Optimization

Authors: Jiaming Xu, Kuang Xu, Dana Yang | Published: 2021-02-23 | Updated: 2021-10-23
Data Collection
Data Generation
Bayesian Classification