Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 バックドアモデルの検知バックドア攻撃防御手法 2020.06.19 2025.05.13 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 トリガーの検知トロイの木馬検出バックドアモデルの検知 2019.08.09 2025.05.13 Literature Database
Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12 ハードウェアセキュリティバックドアモデルの検知マルチクラス分類 2019.03.12 2025.05.13 Literature Database
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28 バックドアモデルの検知敵対的サンプル敵対的攻撃手法 2019.02.18 2025.05.13 Literature Database
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 トリガーの検知トロイの木馬検出バックドアモデルの検知 2019.02.18 2025.05.13 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 バックドアモデルの検知モデル抽出攻撃の検知視覚プライバシー 2019.02.05 2025.05.13 Literature Database
Towards resilient machine learning for ransomware detection Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16 バックドアモデルの検知マルウェア検出手法生成的敵対ネットワーク 2018.12.21 2025.05.13 Literature Database
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15 バックドアモデルの検知モデル性能評価最適化アルゴリズムの選択と評価 2018.11.27 2025.05.13 Literature Database
The Taboo Trap: Behavioural Detection of Adversarial Samples Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21 バックドアモデルの検知暗号化技術防御手法 2018.11.18 2025.05.13 Literature Database
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09 バックドアモデルの検知ロバスト性向上手法一般化の影響 2018.10.16 2025.05.13 Literature Database