文献データベース

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy

Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29
強化学習アルゴリズム
強化学習攻撃
敵対的攻撃

Preservation of Anomalous Subgroups On Machine Learning Transformed Data

Authors: Samuel C. Maina, Reginald E. Bryant, William O. Goal, Robert-Florian Samoilescu, Kush R. Varshney, Komminist Weldemariam | Published: 2019-11-09
プライバシー保護アルゴリズム
プライバシー評価
機械学習の基礎

Analyzing Bias in Sensitive Personal Information Used to Train Financial Models

Authors: Reginald Bryant, Celia Cintas, Isaac Wambugu, Andrew Kinai, Komminist Weldemariam | Published: 2019-11-09
データ生成手法
プライバシーリスク管理
法律遵守

AutoIDS: Auto-encoder Based Method for Intrusion Detection System

Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08
セキュリティメトリック
攻撃検出
機械学習の基礎

Imperceptible Adversarial Attacks on Tabular Data

Authors: Vincent Ballet, Xavier Renard, Jonathan Aigrain, Thibault Laugel, Pascal Frossard, Marcin Detyniecki | Published: 2019-11-08 | Updated: 2019-12-13
タブularデータの脆弱性
敵対的サンプル
敵対的攻撃

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08
プライバシー保護
効率評価
性能評価

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
モデル性能評価
敵対的攻撃手法
特徴エンジニアリング

Certified Data Removal from Machine Learning Models

Authors: Chuan Guo, Tom Goldstein, Awni Hannun, Laurens van der Maaten | Published: 2019-11-08 | Updated: 2023-11-08
データ削除アルゴリズム
プライバシー評価
マシン・アンラーニング

An automated approach for task evaluation using EEG signals

Authors: Vishal Anand, S. R. Sreeja, Debasis Samanta | Published: 2019-11-07 | Updated: 2019-11-14
タスク設計
信号処理
機械学習

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
モデル性能評価
敵対的攻撃手法
知識移転性