AIセキュリティポータルbot

Resilient Non-Submodular Maximization over Matroid Constraints

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-04-02 | Updated: 2018-12-06
Convergence Analysis
Optimization Problem
Approximate Calculation

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28
Poisoning
Loss Function
Detection of Poisonous Data

Adversarial Attacks and Defences Competition

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe | Published: 2018-03-31
Certified Robustness
Adversarial attack
Robustness of Deep Networks

Two-Stream Neural Networks for Tampered Face Detection

Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29
Detection of Deepfakes
Performance Evaluation Metrics
Deep Learning Method

Protection against Cloning for Deep Learning

Authors: Richard Kenway | Published: 2018-03-29
Detection of Model Extraction Attacks
Adversarial attack
Robustness of Deep Networks

Defending against Adversarial Images using Basis Functions Transformations

Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16
Watermarking
Certified Robustness
Adversarial attack

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14
Privacy Protection
Feature Selection Method
Statistical Analysis

Privacy Preserving Machine Learning: Threats and Solutions

Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27
Privacy Enhancing Technology
Dimensionality Reduction Method

Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries

Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27
Graph Privacy
Privacy Protection
Differential Privacy

Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27
Experimental Validation
Adversarial Learning
Adversarial attack