AIセキュリティポータルbot

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28
Protocol Procedure
Trust Evaluation Module
Information Gathering Methods

Against Membership Inference Attack: Pruning is All You Need

Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04
Membership Inference
Adversarial attack
Deep Learning Technology

Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch | Published: 2020-08-27
Data Generation
Privacy Loss Analysis
Privacy Assessment

Adversarial Eigen Attack on Black-Box Models

Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27
Adversarial attack
Optimization Strategy
Deep Learning Technology

Adversarially Training for Audio Classifiers

Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25
Adversarial Example
Adversarial Learning
Speech Signal Processing

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning

Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25
Poisoning
Adversarial Learning
Deep Learning

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24
Smart Healthcare
Privacy Protection Method
Encryption Technology

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23
Model Inversion
Adversarial Attack Methods
Face Recognition

Multiple Classification with Split Learning

Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11
Reconstruction Attack
Deep Learning
Deep Learning Method

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22
Data Generation
Information-Theoretic Evaluation
Machine Learning Algorithm