AIセキュリティポータルbot

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05
FPGA Security
Malicious Client
Computational Efficiency

Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations

Authors: Pu Zhao, Parikshit Ram, Songtao Lu, Yuguang Yao, Djallel Bouneffouf, Xue Lin, Sijia Liu | Published: 2020-09-29 | Updated: 2022-08-17
Few-Shot Learning
Task Adaptation Method
Optimization Methods

Information Obfuscation of Graph Neural Networks

Authors: Peiyuan Liao, Han Zhao, Keyulu Xu, Tommi Jaakkola, Geoffrey Gordon, Stefanie Jegelka, Ruslan Salakhutdinov | Published: 2020-09-28 | Updated: 2021-06-13
Game Theory
Information-Theoretic Privacy
Optimization Strategy

Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David | Published: 2020-09-28 | Updated: 2022-06-01
Malware Classification
Model Interpretability
Adversarial Example

Adversarial Robustness of Stabilized NeuralODEs Might be from Obfuscated Gradients

Authors: Yifei Huang, Yaodong Yu, Hongyang Zhang, Yi Ma, Yuan Yao | Published: 2020-09-28 | Updated: 2021-06-02
Poisoning
Relationship between Robustness and Privacy
Deep Learning

A Robust graph attention network with dynamic adjusted Graph

Authors: Xianchen Zhou, Yaoyun Zeng, Hongxia Wang | Published: 2020-09-28 | Updated: 2022-08-04
Graph Transformation
Poisoning
Relationship between Robustness and Privacy

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
Relationship between Robustness and Privacy
Vulnerability of Adversarial Examples
Research Methodology

Beneficial Perturbations Network for Defending Adversarial Examples

Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning

Differentially Private Adversarial Robustness Through Randomized Perturbations

Authors: Nan Xu, Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier | Published: 2020-09-27
Data Generation
Relationship between Robustness and Privacy
Adversarial Example

Federated Transfer Learning: concept and applications

Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06
Privacy Protection Method
Information-Theoretic Privacy
Machine Learning Method