文献データベース

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16
プライバシーリスク管理
ポイズニング
通信効率

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16
AIシステムの関係性
攻撃検出
脆弱性検出

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15
サイバーセキュリティ
攻撃手法
機械学習技術

Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14
悪意のあるノード検出
攻撃検出
脅威モデリング

Practical Vertical Federated Learning with Unsupervised Representation Learning

Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13
データ保護手法
プライバシーリスク管理
通信効率

Unifying Gradients to Improve Real-world Robustness for Deep Networks

Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24
ロバスト性評価
性能評価指標
攻撃手法

A Knowledge Distillation-Based Backdoor Attack in Federated Learning

Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12
バックドア攻撃
知識の蒸留

Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12
マルウェア分類
マルウェア検出手法
攻撃手法

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15
クライアント側防御
ポイズニング
攻撃手法

Quality Not Quantity: On the Interaction between Dataset Design and Robustness of CLIP

Authors: Thao Nguyen, Gabriel Ilharco, Mitchell Wortsman, Sewoong Oh, Ludwig Schmidt | Published: 2022-08-10 | Updated: 2023-02-01
データ生成手法
学習データのバイアス排除
深層学習