文献データベース

Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12
情報セキュリティ
脅威モデル

ByzShield: An Efficient and Robust System for Distributed Training

Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy | Published: 2020-10-10 | Updated: 2021-03-04
ビザンチン行動に対する具体的な対策
分散学習
重み更新手法

How Does Mixup Help With Robustness and Generalization?

Authors: Linjun Zhang, Zhun Deng, Kenji Kawaguchi, Amirata Ghorbani, James Zou | Published: 2020-10-09 | Updated: 2021-03-17
ポイズニング
ロバスト性評価
一般化性能

Anomaly detection with superexperts under delayed feedback

Authors: Raisa Dzhamtyrova, Carsten Maple | Published: 2020-10-08 | Updated: 2021-04-22
ゲーム理論
一般化性能
重み更新手法

Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

Authors: Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2020-10-08 | Updated: 2024-01-08
マルチクラス分類
モデル性能評価
概念漂流

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07
スマートヘルスケア
敵対的サンプル
敵対的攻撃手法

Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples

Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30
ポイズニング
ロバスト性向上手法
敵対的攻撃

CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails

Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07
モデルアーキテクチャ
学習の改善
機械学習

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02
メンバーシップ推論
敵対的攻撃
機械学習

Correlated Differential Privacy: Feature Selection in Machine Learning

Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07
データ保護手法
データ選択戦略
特徴重要度分析