AIセキュリティポータルbot

Adversarial Risk and the Dangers of Evaluating Against Weak Attacks

Authors: Jonathan Uesato, Brendan O'Donoghue, Aaron van den Oord, Pushmeet Kohli | Published: 2018-02-15 | Updated: 2018-06-12
Adversarial Learning
Adversarial Learning
Adversarial attack

Stealing Hyperparameters in Machine Learning

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07
Privacy-Preserving Machine Learning
Model Extraction Attack
Optimization Strategy

Generative Models for Spear Phishing Posts on Social Media

Authors: John Seymour, Philip Tully | Published: 2018-02-14
Data Collection
User Activity Analysis
Machine Learning Method

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19
Certified Robustness
Adversarial Example
Adversarial attack

Understanding Membership Inferences on Well-Generalized Learning Models

Authors: Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen | Published: 2018-02-13
Privacy Protection Mechanism
Membership Inference
Model Inversion

Distributed One-class Learning

Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro | Published: 2018-02-10
Privacy Protection Mechanism
Adversarial Learning
Machine Learning Method

Certified Robustness to Adversarial Examples with Differential Privacy

Authors: Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana | Published: 2018-02-09 | Updated: 2019-05-29
Robustness Evaluation
Adversarial Example
Adversarial Learning

URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection

Authors: Hung Le, Quang Pham, Doyen Sahoo, Steven C. H. Hoi | Published: 2018-02-09 | Updated: 2018-03-02
Membership Inference
Model Inversion
Machine Learning Method

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08
Poisoning
Adversarial attack
Detection of Poisonous Data

A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines

Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07
Multi-Objective Optimization
Adversarial attack
Machine Learning Method