文献データベース

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks

Authors: Ayoub Mars, Ahmad Abadleh, Wael Adi | Published: 2019-11-01
セキュアな通信チャネル
プライバシー管理
生体認証キー生成

Privacy-Preserving Machine Learning Using EtC Images

Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01
プライバシー管理
次元削減手法
知的財産保護

Reducing audio membership inference attack accuracy to chance: 4 defenses

Authors: Michael Lomnitz, Nina Lopatina, Paul Gamble, Zigfried Hampel-Arias, Lucas Tindall, Felipe A. Mejia, Maria Alejandra Barrios | Published: 2019-10-31
プライバシー管理
攻撃手法
防御手法の効果分析

Confident Learning: Estimating Uncertainty in Dataset Labels

Authors: Curtis G. Northcutt, Lu Jiang, Isaac L. Chuang | Published: 2019-10-31 | Updated: 2022-08-22
データキュレーション
不確実性の定量化
深層学習手法

A machine-learning approach to Detect users’ suspicious behaviour through the Facebook wall

Authors: Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab | Published: 2019-10-31
オープンソース開示
プライバシー問題
将来の研究

Certifiable Robustness to Graph Perturbations

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19
GNN
攻撃手法
脆弱性評価手法

A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning

Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30
収束性分析
攻撃手法
毒性攻撃に特化した内容

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30
ポイズニング
攻撃手法
敵対的サンプル

DeepWiFi: Cognitive WiFi with Deep Learning

Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu | Published: 2019-10-29
シミュレーション環境
データ生成
プロトコル手順

Secure and Efficient Federated Transfer Learning

Authors: Shreya Sharma, Xing Chaoping, Yang Liu, Yan Kang | Published: 2019-10-29 | Updated: 2019-10-30
プライバシー管理
ポイズニング
深層転移学習