Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24 データ生成ディープフェイク画像処理 2017.03.30 2025.05.13 Literature Database
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28 IoTセキュリティ問題セキュリティ分析手法攻撃手法 2017.03.28 2025.05.13 Literature Database
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 セキュリティ分析戦略的ゲーム攻撃パターン抽出 2017.03.27 2025.05.13 Literature Database
Biologically inspired protection of deep networks from adversarial attacks Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27 モデルの設計や精度モデルの頑健性保証学習の改善 2017.03.27 2025.05.13 Literature Database
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23 性能評価攻撃パターン抽出敵対的サンプル 2017.03.23 2025.05.13 Literature Database
PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks Authors: Stefano Bennati, Catholijn M. Jonker | Published: 2017-03-21 イベント識別プライバシー保護メカニズム非中央集権的処理 2017.03.21 2025.05.13 Literature Database
CSI: A Hybrid Deep Model for Fake News Detection Authors: Natali Ruchansky, Sungyong Seo, Yan Liu | Published: 2017-03-20 | Updated: 2017-09-03 データサイエンス手法モデルの設計や精度偽情報の検出 2017.03.20 2025.05.13 Literature Database
Counterfactual Fairness Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08 公平性のあるAIモデルの作成因果モデルの重要性観察的公平性の測定 2017.03.20 2025.05.13 Literature Database
Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking Authors: Erwin Quiring, Daniel Arp, Konrad Rieck | Published: 2017-03-16 バックドア攻撃攻撃パターン抽出防御メカニズム 2017.03.16 2025.05.13 Literature Database
Understanding Black-box Predictions via Influence Functions Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29 ポイズニング学習の改善説明可能性評価 2017.03.14 2025.05.13 Literature Database