文献データベース

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture

Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15
メンバーシップ推論
敵対的サンプル
防御メカニズム

Adversarial Attacks on ML Defense Models Competition

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen | Published: 2021-10-15
ロバスト性に関する評価
敵対的サンプル
敵対的攻撃手法

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15
サイバーセキュリティの自動化
機械学習アルゴリズム
自動脆弱性修復

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15
ユーザー活動解析
性能評価指標
機械学習アルゴリズム

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14
モデル選択
性能評価指標
機械学習アルゴリズム

Resource-constrained Federated Edge Learning with Heterogeneous Data: Formulation and Analysis

Authors: Yi Liu, Yuanshao Zhu, James J. Q. Yu | Published: 2021-10-14
アルゴリズム設計
分散学習
連合学習

Bandwidth Utilization Side-Channel on ML Inference Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14
リソース消費分析
敵対的攻撃手法
機械学習アルゴリズム

AI Total: Analyzing Security ML Models with Imperfect Data in Production

Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13
データ管理システム
モデル選択
ユーザー活動解析

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15
バックドア攻撃
フォレンジックレポート
敵対的攻撃手法

Infinitely Divisible Noise in the Low Privacy Regime

Authors: Rasmus Pagh, Nina Mesing Stausholm | Published: 2021-10-13 | Updated: 2022-03-07
データ生成
プライバシー侵害
連合学習