文献データベース

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
攻撃の評価
攻撃検出
防御手法

Towards Federated Learning With Byzantine-Robust Client Weighting

Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler | Published: 2020-04-10 | Updated: 2021-05-18
ポイズニング
ロバスト性向上手法
最適化問題

Luring of transferable adversarial perturbations in the black-box paradigm

Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2020-04-10 | Updated: 2021-03-03
堅牢性向上手法
攻撃の評価
敵対的サンプル

Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness

Authors: Haidong Xie, Lixin Qian, Xueshuang Xiang, Naijin Liu | Published: 2020-04-10
プルーニング手法
ロバスト性
実験的検証

Blind Adversarial Training: Balance Accuracy and Robustness

Authors: Haidong Xie, Xueshuang Xiang, Naijin Liu, Bin Dong | Published: 2020-04-10
ロバスト性
敵対的学習
適応型敵対的訓練

Decentralized Differentially Private Segmentation with PATE

Authors: Dominik Fay, Jens Sjölund, Tobias J. Oechtering | Published: 2020-04-10
情報理論的評価
深層学習
画像特徴抽出

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
攻撃の評価
脆弱性評価手法
防御手法

Deep Learning and Open Set Malware Classification: A Survey

Authors: Jingyun Jia | Published: 2020-04-08
オープンセット認識
ポイズニング
マルウェア分類

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08
URLベース検出
トレーニング手法
機械学習技術

Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios

Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07
ロバスト性に関する評価
攻撃の評価
最大カバレッジ問題