Reconstruction of Privacy-Sensitive Data from Protected Templates Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08 プライバシー手法再構成攻撃性能低下の要因 2019.05.08 2025.05.13 Literature Database
Adversarial Examples Are Not Bugs, They Are Features Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry | Published: 2019-05-06 | Updated: 2019-08-12 ロバスト推定性能低下の要因敵対的サンプル 2019.05.06 2025.05.13 Literature Database