AIセキュリティポータルbot

GraphReach: Position-Aware Graph Neural Network using Reachability Estimations

Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20
Graph Transformation
Deep Learning
Deep Learning Method

Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training

Authors: Alfred Laugros, Alice Caplier, Matthieu Ospici | Published: 2020-08-19
Robustness Improvement Method
Adversarial Example
Vulnerability of Adversarial Examples

Early Identification of Services in HTTPS Traffic

Authors: Wazen M. Shbair, Thibault Cholez, Jerome Francois, Isabelle Chrisment | Published: 2020-08-19
Performance Evaluation Metrics
Machine Learning Method
Communication Efficiency

Toward Smart Security Enhancement of Federated Learning Networks

Authors: Junjie Tan, Ying-Chang Liang, Nguyen Cong Luong, Dusit Niyato | Published: 2020-08-19
Poisoning
Poisoning Attack
Federated Learning

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18
Clustering methods
Security Analysis
Threat Model

Improving adversarial robustness of deep neural networks by using semantic information

Authors: Lina Wang, Rui Tang, Yawei Yue, Xingshu Chen, Wei Wang, Yi Zhu, Xuemei Zeng | Published: 2020-08-18 | Updated: 2021-06-17
Semantic Information Extraction
Robustness
Adversarial Example

Efficient Private Machine Learning by Differentiable Random Transformations

Authors: Fei Zheng | Published: 2020-08-18
Membership Inference
Encryption Method
Machine Learning

Usable Security for ML Systems in Mental Health: A Framework

Authors: Helen Jiang, Erwen Senge | Published: 2020-08-18
Mental Model
Usability
Reliability

Privacy-preserving feature selection: A survey and proposing a new set of protocols

Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17
Privacy-Preserving Data Mining
Evaluation Method
Watermark Evaluation

WAFFLE: Watermarking in Federated Learning

Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22
Watermarking
Poisoning
Machine Learning Application