AIセキュリティポータルbot

Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework

Authors: Huafei Zhu, Zengxiang Li, Mervyn Cheah, Rick Siow Mong Goh | Published: 2020-03-17 | Updated: 2020-04-08
Secure Aggregation
Privacy Protection Method
Federated Learning

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
Training Method
State Transition Model
Vulnerability Attack Method

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

Certified Defenses for Adversarial Patches

Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25
Robustness
Vulnerability Attack Method
Defense Method

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
Poisoning
Adversarial Attack Methods
Defense Method

Manifold Regularization for Locally Stable Deep Neural Networks

Authors: Charles Jin, Martin Rinard | Published: 2020-03-09 | Updated: 2020-09-22
Training Method
Robustness
Adversarial Example

Towards Probabilistic Verification of Machine Unlearning

Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01
Training Method
Backdoor Attack
Backdoor Attack Mitigation

Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world

Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12
Adversarial Example
Adversarial attack
Generative Model

Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM

Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26
Game Theory
Poisoning
Adversarial Attack Methods

Some Geometrical and Topological Properties of DNNs’ Decision Boundaries

Authors: Bo Liu, Mengya Shen | Published: 2020-03-07 | Updated: 2021-04-16
Robustness Evaluation
Mathematical Foundations
Fundamentals of Machine Learning