文献データベース

On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26
DNN IP保護手法
バックドア攻撃
攻撃手法

Measuring Bias in Contextualized Word Representations

Authors: Keita Kurita, Nidhi Vyas, Ayush Pareek, Alan W Black, Yulia Tsvetkov | Published: 2019-06-18
AIによる出力のバイアスの検出
アルゴリズムの公平性
大規模言語モデル

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26
ポイズニング
敵対的摂動手法
最適化問題

Membership Privacy for Machine Learning Models Through Knowledge Transfer

Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31
プライバシー保護
攻撃手法
知識移転性

Real-Time Privacy-Preserving Data Release for Smart Meters

Authors: Mohammadhadi Shateri, Francisco Messina, Pablo Piantanida, Fabrice Labeau | Published: 2019-06-14 | Updated: 2021-11-25
プライバシー保護
時系列分析
非同一データセット

Towards Stable and Efficient Training of Verifiably Robust Neural Networks

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27
データセット分析
安定性評価
敵対的摂動手法

Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29
初期化手法
敵対的摂動手法
最適化問題

Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary

Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16
敵対的サンプル
敵対的学習
防御手法

A Review of Machine Learning Applications in Fuzzing

Authors: Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, Philip W Kegelmeyer | Published: 2019-06-13 | Updated: 2019-10-09
セキュリティテスト
プログラムの検証
強化学習

Deep Reinforcement Learning for Cyber Security

Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02
サイバーセキュリティの自動化
深層強化学習
防御手法