文献データベース

Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy

Authors: Nuria Rodríguez-Barroso, Goran Stipcich, Daniel Jiménez-López, José Antonio Ruiz-Millán, Eugenio Martínez-Cámara, Gerardo González-Seco, M. Victoria Luzón, Miguel Ángel Veganzones, Francisco Herrera | Published: 2020-07-02 | Updated: 2020-10-06
プライバシー管理
機械学習
連合学習

Robust and Accurate Authorship Attribution via Program Normalization

Authors: Yizhen Wang, Mohannad Alhanahnah, Ke Wang, Mihai Christodorescu, Somesh Jha | Published: 2020-07-01 | Updated: 2022-02-25
メンバーシップ推論
ロバスト性
敵対的攻撃

Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey

Authors: Samuel Henrique Silva, Peyman Najafirad | Published: 2020-07-01 | Updated: 2020-07-03
ポイズニング
敵対的サンプル
敵対的攻撃

Multi-Task Variational Information Bottleneck

Authors: Weizhu Qian, Bowei Chen, Yichao Zhang, Guanghui Wen, Franck Gechter | Published: 2020-07-01 | Updated: 2021-03-01
アルゴリズム設計
一般化性能
機械学習手法

A Le Cam Type Bound for Adversarial Learning and Applications

Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10
敵対的サンプル
敵対的攻撃
機械学習手法

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Authors: Deqiang Li, Qianmu Li | Published: 2020-06-30
ポイズニング
マルウェア進化
敵対的攻撃

Model-Targeted Poisoning Attacks with Provable Convergence

Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian | Published: 2020-06-30 | Updated: 2021-04-21
バックドア攻撃
ポイズニング
攻撃シナリオ分析

Reducing Risk of Model Inversion Using Privacy-Guided Training

Authors: Abigail Goldsteen, Gilad Ezov, Ariel Farkash | Published: 2020-06-29
プライバシー漏洩
メンバーシップ推論
モデルインバージョン

FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28
敵対的サンプル
敵対的攻撃
防御メカニズム

Understanding Gradient Clipping in Private SGD: A Geometric Perspective

Authors: Xiangyi Chen, Zhiwei Steven Wu, Mingyi Hong | Published: 2020-06-27 | Updated: 2021-03-18
アルゴリズム設計
プライバシー漏洩
最適化手法