AIセキュリティポータル

  • Literature Database
  • AI Security Map
  • Links
  • About us

Counterfactual Fairness

Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08
2017.03.20 2025.05.28
Literature Database

Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

Authors: Erwin Quiring, Daniel Arp, Konrad Rieck | Published: 2017-03-16
2017.03.16 2025.05.28
Literature Database

Understanding Black-box Predictions via Influence Functions

Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29
2017.03.14 2025.05.28
Literature Database

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10
2017.03.10 2025.05.28
Literature Database

Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun | Published: 2017-03-08 | Updated: 2019-11-13
2017.03.08 2025.05.28
Literature Database

Generative Poisoning Attack Method Against Neural Networks

Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03
2017.03.03 2025.05.28
Literature Database

Differentially Private Bayesian Learning on Distributed Data

Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29
2017.03.03 2025.05.28
Literature Database
Previous 1 … 550 551
AIセキュリティポータル
  • Terms of Use
  • Privacy Policy
  • Follow us
Copyright© KDDI Research, Inc. All Rights Reserved.
    • Literature Database
    • AI Security Map
    • Links
    • About us
  • AIセキュリティポータル