AIセキュリティポータルbot

Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data

Authors: Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar | Published: 2016-10-18 | Updated: 2017-03-03
Privacy-Preserving Machine Learning
Differential Privacy
Self-Supervised Learning

Federated Learning: Strategies for Improving Communication Efficiency

Authors: Jakub Konečný, H. Brendan McMahan, Felix X. Yu, Peter Richtárik, Ananda Theertha Suresh, Dave Bacon | Published: 2016-10-18 | Updated: 2017-10-30
Reduction of Communication Costs
Federated Learning
Quantization and Privacy

An arbiter PUF secured by remote random reconfigurations of an FPGA

Authors: Alexander Spenke, Ralph Breithaupt, Rainer Plaga | Published: 2016-10-12
FPGA
Device Authentication
モデル抽出攻撃に関連するリスク

Safe, Multi-Agent, Reinforcement Learning for Autonomous Driving

Authors: Shai Shalev-Shwartz, Shaked Shammah, Amnon Shashua | Published: 2016-10-11
フェールセーフ機構
Reinforcement Learning Algorithm
Deep Learning Method

Equality of Opportunity in Supervised Learning

Authors: Moritz Hardt, Eric Price, Nathan Srebro | Published: 2016-10-07
Model Identification
Creation of Fair AI Models
Measurement of Observational Fairness

Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization

Authors: Ramprasaath R. Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, Dhruv Batra | Published: 2016-10-07 | Updated: 2019-12-03
XAI (Explainable AI)
Deep Learning Technology
画像キャプショニング

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Authors: Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar | Published: 2016-10-06
DGA検出手法
Adversarial Learning
Robustness of Deep Networks

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long, Patrick McDaniel | Published: 2016-10-03 | Updated: 2018-06-27
Model Robustness
Adversarial Training
Defense Mechanism

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

Authors: Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu | Published: 2016-09-10
Security Analysis Method
Dynamic Analysis Framework
Feature Selection Method

Control Flow Change in Assembly as a Classifier in Malware Analysis

Authors: Andree Linke, Nhien-An Le-Khac | Published: 2016-09-09
Data Extraction and Analysis
Bayesian Classification
Feature Selection Method