AIセキュリティポータルbot

Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks

Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24
Data Generation
Deepfake
Image Processing

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28
IoT Security Issues
Security Analysis Method
Attack Method

Adversarial Source Identification Game with Corrupted Training

Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27
Security Analysis
Strategic Game
Attack Pattern Extraction

Biologically inspired protection of deep networks from adversarial attacks

Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27
Model Design and Accuracy
Certified Robustness
Improvement of Learning

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23
Performance Evaluation
Attack Pattern Extraction
Adversarial Example

PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks

Authors: Stefano Bennati, Catholijn M. Jonker | Published: 2017-03-21
Event Identification
Privacy Protection Mechanism
Decentralized Processing

CSI: A Hybrid Deep Model for Fake News Detection

Authors: Natali Ruchansky, Sungyong Seo, Yan Liu | Published: 2017-03-20 | Updated: 2017-09-03
Data Science Methodology
Model Design and Accuracy
Detection of Misinformation

Counterfactual Fairness

Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08
Creation of Fair AI Models
Importance of Causal Models
Measurement of Observational Fairness

Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

Authors: Erwin Quiring, Daniel Arp, Konrad Rieck | Published: 2017-03-16
Backdoor Attack
Attack Pattern Extraction
Defense Mechanism

Understanding Black-box Predictions via Influence Functions

Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29
Poisoning
Improvement of Learning
Explainability Evaluation