文献データベース

Improved Image Wasserstein Attacks and Defenses

Authors: Edward J. Hu, Adith Swaminathan, Hadi Salman, Greg Yang | Published: 2020-04-26 | Updated: 2023-05-09
ロバスト性分析
敵対的サンプル
敵対的攻撃手法

Privacy in Deep Learning: A Survey

Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, Hadi Esmaeilzadeh | Published: 2020-04-25 | Updated: 2020-11-07
プライバシー保護技術
メンバーシップ推論
深層学習技術

Improved Adversarial Training via Learned Optimizer

Authors: Yuanhao Xiong, Cho-Jui Hsieh | Published: 2020-04-25
ポイズニング
最適化問題
適応型敵対的訓練

NetML: A Challenge for Network Traffic Analytics

Authors: Onur Barut, Yan Luo, Tong Zhang, Weigang Li, Peilong Li | Published: 2020-04-25
TLS特徴分析
マルウェア分類
特徴エンジニアリング

A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers

Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09
ポイズニング
敵対的攻撃手法
最適化問題

6G White paper: Research challenges for Trust, Security and Privacy

Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning | Published: 2020-04-24 | Updated: 2020-04-30
セキュアな通信チャネル
プライバシー保護技術
物理層セキュリティ

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Authors: Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor | Published: 2020-04-24
バックドア攻撃
ロバスト性分析
正則化

Adversarial Attacks and Defenses: An Interpretation Perspective

Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07
ポイズニング
敵対的サンプル
敵対的攻撃手法

Adversarial Machine Learning in Network Intrusion Detection Systems

Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23
敵対的サンプル
敵対的攻撃手法
機械学習

ArchNet: Data Hiding Model in Distributed Machine Learning System

Authors: Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan | Published: 2020-04-23 | Updated: 2020-05-31
暗号化プロトコル
機械学習
画像処理