AIセキュリティポータルbot

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data

Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02
Data Collection Method
Speech Enhancement Technology
Speech Recognition System

Data mining for detecting Bitcoin Ponzi schemes

Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01
Data Collection
Model evaluation methods
Imbalanced Dataset

Online Feature Ranking for Intrusion Detection Systems

Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15
ML-Based IDS
Data Collection Method
Machine Learning Technology

Predictive Uncertainty Estimation via Prior Networks

Authors: Andrey Malinin, Mark Gales | Published: 2018-02-28 | Updated: 2018-11-29
Quantification of Uncertainty
Uncertainty Assessment
Deep Learning Method

Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain

Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27
Data Collection
Model evaluation methods
Machine Learning Technology

Generalized Byzantine-tolerant SGD

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23
Robust Estimation
Adversarial Attack Analysis
Machine Learning Technology

Understanding and Enhancing the Transferability of Adversarial Examples

Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27
Model evaluation methods
Adversarial Learning
Adversarial Attack Analysis

Robust GANs against Dishonest Adversaries

Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10
Robust Estimation
Adversarial Attack Analysis
Adversarial Training

On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27
Adversarial Example Detection
Adversarial Attack Analysis
Machine Learning Technology

Yedrouj-Net: An efficient CNN for spatial steganalysis

Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26
Privacy Design Principles
Machine Learning Technology
Research Methodology