文献データベース

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf | Published: 2020-10-29
TEE実装
アクセス制御
メモリレイアウト設計

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29
敵対的サンプル
証明書の比率
評価手法

Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?

Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11
敵対的サンプル
生成モデルの課題
評価手法

Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27
データフロー解析
攻撃検出
機械学習手法

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Authors: Seng Pei Liew, Tsubasa Takahashi | Published: 2020-10-27
メンバーシップ推論
メンバーシップ開示リスク
顔認識

Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26
メンバーシップ推論
情報埋め込み攻撃
評価手法

Asymptotic Behavior of Adversarial Training in Binary Classification

Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14
攻撃の評価
敵対的サンプル
正則化

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25
TEE実装
ウォーターマーキング
性能低下の要因

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
敵対的サンプル
敵対的サンプルの検知
機械学習アルゴリズム

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24
将来の研究
情報理論的評価
機械学習アルゴリズム