AIセキュリティポータルbot

Resilient Active Information Gathering with Mobile Robots

Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02
Process Environment
Robot Control
Communication Efficiency

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24
Exploratory Attack
Adversarial Perturbation Techniques
Machine Learning Technology

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Datasheets for Datasets

Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, Kate Crawford | Published: 2018-03-23 | Updated: 2021-12-01
Data Curation
Data Management System
Privacy Assessment

Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization

Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28
Certified Robustness
Adversarial Learning
Regularization

Robust Blind Deconvolution via Mirror Descent

Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21
Robustness Analysis
Convergence Property
Machine Learning Method

Adversarial Defense based on Structure-to-Signal Autoencoders

Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21
Poisoning
Adversarial Learning
Image Feature Extraction

Resilient Monotone Sequential Maximization

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16
Resource Consumption Analysis
Reinforcement Learning Algorithm
Machine Learning Method