AIセキュリティポータルbot

Local Competition and Uncertainty for Adversarial Robustness in Deep Learning

Authors: Antonios Alexos, Konstantinos P. Panousis, Sotirios Chatzis | Published: 2020-06-18
Performance Evaluation
Adversarial Learning
Deep Learning Method

OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training

Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25
Adversarial Attack Methods
Machine Learning Algorithm
Image Processing

Classifier-independent Lower-Bounds for Adversarial Robustness

Authors: Elvis Dohmatob | Published: 2020-06-17 | Updated: 2020-11-10
Bayesian Classification
Attack Method
Adversarial Learning

AdvMind: Inferring Adversary Intent of Black-Box Attacks

Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16
Performance Evaluation
Attack Method
Adversarial Learning

On sparse connectivity, adversarial robustness, and a novel model of the artificial neuron

Authors: Sergey Bochkanov | Published: 2020-06-16
Algorithm Design
Performance Evaluation
Deep Learning Method

Byzantine-Robust Learning on Heterogeneous Datasets via Bucketing

Authors: Sai Praneeth Karimireddy, Lie He, Martin Jaggi | Published: 2020-06-16 | Updated: 2023-11-22
Algorithm Design
Poisoning
Non-Identical Dataset

New Interpretations of Normalization Methods in Deep Learning

Authors: Jiacheng Sun, Xiangyong Cao, Hanwen Liang, Weiran Huang, Zewei Chen, Zhenguo Li | Published: 2020-06-16
Hyperparameter Optimization
Regularization
Deep Learning Method

SPLASH: Learnable Activation Functions for Improving Accuracy and Adversarial Robustness

Authors: Mohammadamin Tavakoli, Forest Agostinelli, Pierre Baldi | Published: 2020-06-16
Performance Evaluation
Adversarial Example
Deep Learning Method

DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder

Authors: Ao Zhang, Jinwen Ma | Published: 2020-06-16
Graph Neural Network
Adversarial Learning

CryptoNAS: Private Inference on a ReLU Budget

Authors: Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg | Published: 2020-06-15 | Updated: 2021-05-13
Cryptography
Privacy Protection in Machine Learning
Deep Learning Method