AIセキュリティポータルbot

DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30
Performance Evaluation
Deep Learning
Computational Efficiency

A General Framework For Detecting Anomalous Inputs to DNN Classifiers

Authors: Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee | Published: 2020-07-29 | Updated: 2021-06-17
Performance Evaluation
Attack Method
Deep Learning

Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning

Authors: Nuria Rodríguez-Barroso, Eugenio Martínez-Cámara, M. Victoria Luzón, Francisco Herrera | Published: 2020-07-29 | Updated: 2022-02-24
Byzantine Resilience
Poisoning
Defense Mechanism

Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data

Authors: Kai Steverson, Jonathan Mullin, Metin Ahiskali | Published: 2020-07-29
Attack Method
Generative Model Characteristics
Defense Mechanism

Efficient Sparse Secure Aggregation for Federated Learning

Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18
Security Analysis
Privacy Assessment
Computational Efficiency

Face2Face: Real-time Face Capture and Reenactment of RGB Videos

Authors: Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner | Published: 2020-07-29
Deepfake
Real-Time Inference
Robustness

Label-Only Membership Inference Attacks

Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05
Backdoor Attack
Membership Inference
Attack Method

Tempered Sigmoid Activations for Deep Learning with Differential Privacy

Authors: Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson | Published: 2020-07-28
Privacy Technique
Differential Privacy
Adjustment of Activation Functions

Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training

Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12
Performance Evaluation
Adversarial Example
Computational Efficiency

Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning

Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28
Attack Method
Adversarial Example
Adversarial Perturbation Techniques