文献データベース

Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14
トレーニング手法
ハイパーパラメータ最適化
ロバスト性

RAB: Provable Robustness Against Backdoor Attacks

Authors: Maurice Weber, Xiaojun Xu, Bojan Karlaš, Ce Zhang, Bo Li | Published: 2020-03-19 | Updated: 2023-08-03
バックドア攻撃
ロバスト性
敵対的サンプル

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication

Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19
エラー訂正コード
トレーニング手法
プライバシー保護手法

Deep Quaternion Features for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang | Published: 2020-03-18 | Updated: 2020-06-21
DNN IP保護手法
プライバシー保護手法
量子暗号技術

Adversarial Transferability in Wearable Sensor Systems

Authors: Ramesh Kumar Sah, Hassan Ghasemzadeh | Published: 2020-03-17 | Updated: 2021-07-15
敵対的サンプル
敵対的攻撃手法
非同一データセット

Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework

Authors: Huafei Zhu, Zengxiang Li, Mervyn Cheah, Rick Siow Mong Goh | Published: 2020-03-17 | Updated: 2020-04-08
セキュアアグリゲーション
プライバシー保護手法
連合学習

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
トレーニング手法
状態遷移モデル
脆弱性攻撃手法

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
ポイズニング
敵対的攻撃手法
脆弱性攻撃手法

Certified Defenses for Adversarial Patches

Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25
ロバスト性
脆弱性攻撃手法
防御手法

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
ポイズニング
敵対的攻撃手法
防御手法