文献データベース

Generative Extraction of Audio Classifiers for Speaker Identification

Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26
データセット生成
モデル性能評価
音声認識プロセス

$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25
Out-of-Distribution検出
モデル性能評価
階層的分類手法

Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25
DFLに対する攻撃手法
メンバーシップ推論
モデル性能評価

SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination

Authors: Zhuowen Yuan, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li | Published: 2022-07-25
プライバシー分類
プライバシー漏洩
生成モデル

Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence

Authors: Markus Bayer, Tobias Frey, Christian Reuter | Published: 2022-07-22
データセット生成
モデル性能評価
専門家の意見収集プロセス

Applying Machine Learning on RSRP-based Features for False Base Station Detection

Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah | Published: 2022-07-22
モデル性能評価
検出手法の分析
通信解析

Privacy and Transparency in Graph Machine Learning: A Unified Perspective

Authors: Megha Khosla | Published: 2022-07-22 | Updated: 2022-10-19
グラフ機械学習の説明可能性
プライバシー分類
ポイズニング

Careful What You Wish For: on the Extraction of Adversarially Trained Models

Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21
ポイズニング
攻撃手法
敵対的サンプル

One-vs-the-Rest Loss to Focus on Important Samples in Adversarial Training

Authors: Sekitoshi Kanai, Shin'ya Yamaguchi, Masanori Yamada, Hiroshi Takahashi, Kentaro Ohno, Yasutoshi Ida | Published: 2022-07-21 | Updated: 2023-04-26
敵対的サンプル
適応型敵対的訓練
難易度の高いサンプル

Digital Twin-based Intrusion Detection for Industrial Control Systems

Authors: Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos | Published: 2022-07-20
MLベースのIDS
フレームワーク
攻撃手法