AIセキュリティポータルbot

White-box vs Black-box: Bayes Optimal Strategies for Membership Inference

Authors: Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou | Published: 2019-08-29
Sample Complexity
Membership Inference
Difficulty Calibration

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29
Robustness Verification Method
Adversarial Example
Machine Learning Application

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis

Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15
Text Extraction Method
Information Extraction
Machine Learning Algorithm

Fairness-Aware Process Mining

Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28
Data Collection
Feature Extraction Method
Measurement of Observational Fairness

On Inferring Training Data Attributes in Machine Learning Models

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar | Published: 2019-08-28 | Updated: 2019-10-12
Membership Inference
Attribute Disclosure Risk
Attack Type

Rényi Differential Privacy of the Sampled Gaussian Mechanism

Authors: Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2019-08-28
Sample Complexity
Privacy Assessment
Information-Theoretic Privacy

Detection of Backdoors in Trained Classifiers Without Access to the Training Set

Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19
Backdoor Attack
Attack Type
Adversarial Attack Detection

Key Protected Classification for Collaborative Learning

Authors: Mert Bülent Sarıyıldız, Ramazan Gökberk Cinbiş, Erman Ayday | Published: 2019-08-27 | Updated: 2020-04-22
Training Method
Privacy Enhancing Technology
Cooperative System

SynGAN: Towards Generating Synthetic Network Attacks using GANs

Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26
DDoS Attack
Cybersecurity
Framework

Adversarial Edit Attacks for Tree Data

Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27
Adversarial Example
Adversarial Attack Detection
Machine Learning Application