文献データベース

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
モデル性能評価
敵対的サンプル
敵対的攻撃手法

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
バックドア攻撃
プロトコルの脆弱性や攻撃シナリオに関する議論
攻撃者の行動分析

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15
ポイズニング
敵対的サンプル
敵対的攻撃手法

Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31
トリガーの検知
マシン・アンラーニング
情報セキュリティ

On Robustness to Adversarial Examples and Polynomial Optimization

Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12
モデル性能評価
敵対的攻撃手法
計算問題

Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory

Authors: Arash Rahnama, Andre T. Nguyen, Edward Raff | Published: 2019-11-12
モデル設計
数値安定性の問題
敵対的サンプル

RAD: On-line Anomaly Detection for Highly Unreliable Data

Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11
クラス不均衡
データ漏洩
モデル性能評価

DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs

Authors: Jacob T. Grycel, Robert J. Walls | Published: 2019-11-11
ハードウェアアクセラレータ
リソース最適化
暗号化技術

Privacy-Preserving Gradient Boosting Decision Trees

Authors: Qinbin Li, Zhaomin Wu, Zeyi Wen, Bingsheng He | Published: 2019-11-11 | Updated: 2022-10-10
プライバシー保護アルゴリズム
プライバシー評価
収束保証

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Authors: Asma Aloufi, Peizhao Hu | Published: 2019-11-11
セキュアな通信チャネル
プライバシー保護アルゴリズム
暗号化手法