AIセキュリティポータルbot

Hidden Trigger Backdoor Attacks

Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21
Training Data Generation
Backdoor Attack
Adversarial attack

Black-box Adversarial Attacks with Bayesian Optimization

Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2019-09-30
Bayesian Optimization
Model Design and Accuracy
Adversarial Attack Methods

Universal Approximation with Certified Networks

Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14
Convergence Analysis
Information Security
Machine Learning Technology

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

Authors: Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly | Published: 2019-09-30 | Updated: 2020-06-17
Poisoning
Convergence Analysis
Adversarial attack

Decision Explanation and Feature Importance for Invertible Networks

Authors: Juntang Zhuang, Nicha C. Dvornek, Xiaoxiao Li, Junlin Yang, James S. Duncan | Published: 2019-09-30 | Updated: 2019-10-15
Model Design and Accuracy
Machine Learning Algorithm
Feature Selection Method

Deep k-NN Defense against Clean-label Data Poisoning Attacks

Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13
Backdoor Attack
Performance Evaluation
Detection of Poisonous Data

Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks

Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2019-09-27 | Updated: 2020-07-06
Adversarial Example
Adversarial attack
Quantization and Privacy

Alleviating Privacy Attacks via Causal Learning

Authors: Shruti Tople, Amit Sharma, Aditya Nori | Published: 2019-09-27 | Updated: 2020-07-17
Privacy Loss Analysis
Membership Inference
Machine Learning Technology

A Matrix Factorization Model for Hellinger-based Trust Management in Social Internet of Things

Authors: Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar, H. Eugene Stanley | Published: 2019-09-26 | Updated: 2021-03-02
Signal Analysis
Experimental Validation
Computational Complexity

Lower Bounds on Adversarial Robustness from Optimal Transport

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30
Taxonomy of Attacks
Adversarial attack
Machine Learning Application