AIセキュリティポータルbot

How Does Data Augmentation Affect Privacy in Machine Learning?

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2020-07-21 | Updated: 2021-02-26
Data Extraction and Analysis
Privacy Assessment
Membership Inference

Scaling Polyhedral Neural Network Verification on GPUs

Authors: Christoph Müller, François Serre, Gagandeep Singh, Markus Püschel, Martin Vechev | Published: 2020-07-20 | Updated: 2021-05-18
Performance Evaluation
Deep Learning
Computational Efficiency

Adversarial Immunization for Certifiable Robustness on Graphs

Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25
Graph Transformation
Poisoning
Computational Complexity

Neural Networks with Recurrent Generative Feedback

Authors: Yujia Huang, James Gornet, Sihui Dai, Zhiding Yu, Tan Nguyen, Doris Y. Tsao, Anima Anandkumar | Published: 2020-07-17 | Updated: 2020-11-10
Training Protocol
Deep Learning
Generative Model Characteristics

Learning perturbation sets for robust machine learning

Authors: Eric Wong, J. Zico Kolter | Published: 2020-07-16 | Updated: 2020-10-08
Performance Evaluation
Adversarial Perturbation Techniques
Generative Model Characteristics

Data Poisoning Attacks Against Federated Learning Systems

Authors: Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu | Published: 2020-07-16 | Updated: 2020-08-11
Poisoning
Performance Evaluation
Attack Method

On Adversarial Robustness: A Neural Architecture Search perspective

Authors: Chaitanya Devaguptapu, Devansh Agarwal, Gaurav Mittal, Pulkit Gopalani, Vineeth N Balasubramanian | Published: 2020-07-16 | Updated: 2021-08-26
Performance Evaluation
Deep Learning
Defense Mechanism

Towards Debiasing Sentence Representations

Authors: Paul Pu Liang, Irene Mengze Li, Emily Zheng, Yao Chong Lim, Ruslan Salakhutdinov, Louis-Philippe Morency | Published: 2020-07-16
Bias Detection in AI Output
Algorithm Fairness
Creation of Fair AI Models

AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-15 | Updated: 2020-10-23
Performance Evaluation
Attack Method
Generative Model Characteristics

Robustifying Reinforcement Learning Agents via Action Space Adversarial Training

Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14
Performance Evaluation
Attack Method
Defense Mechanism