文献データベース

NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09
敵対的サンプル
敵対的攻撃手法
深層学習技術

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis

Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30
マルウェア検出
深層学習技術
画像分類解釈

Detecting Adversarial Examples through Nonlinear Dimensionality Reduction

Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01
敵対的サンプル
敵対的攻撃手法
深層学習技術

Adversarial Training and Robustness for Multiple Perturbations

Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18
ロバスト推定
敵対的サンプル
敵対的攻撃手法

Adversarial Training for Free!

Authors: Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein | Published: 2019-04-29 | Updated: 2019-11-20
ポイズニング
敵対的サンプル
適応型敵対的訓練

SEALion: a Framework for Neural Network Inference on Encrypted Data

Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29
フレームワーク
暗号化手法
深層学習技術

Deep pNML: Predictive Normalized Maximum Likelihood for Deep Neural Networks

Authors: Koby Bibas, Yaniv Fogel, Meir Feder | Published: 2019-04-28 | Updated: 2020-01-08
Out-of-Distribution検出
ロバスト推定
深層学習技術

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25
侵入検知システム
深層学習技術
評価手法

A Robust Approach for Securing Audio Classification Against Adversarial Attacks

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25
バックドア攻撃
敵対的サンプル
敵対的攻撃手法

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24
データ収集手法
マルウェア検出
犯罪行為検出