文献データベース

Utility Preserving Secure Private Data Release

Authors: Jasjeet Dhaliwal, Geoffrey So, Aleatha Parker-Wood, Melanie Beck | Published: 2019-01-28 | Updated: 2019-03-15
ランダム化手法
差分プライバシー
距離回復アルゴリズム

Do Not Return Similarity: Face Recovery with Distance

Authors: Mingtian Tan, Zhe Zhou | Published: 2019-01-28 | Updated: 2019-08-06
情報漏洩の原因
顔認証技術
高次元データ分析

Bayesian Differential Privacy for Machine Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-01-28 | Updated: 2020-08-19
プライバシー定義
差分プライバシー
深層学習手法

Interpretable Complex-Valued Neural Networks for Privacy Protection

Authors: Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang | Published: 2019-01-28 | Updated: 2020-01-14
差分プライバシー
敵対的サンプル
深層学習手法

Improving Adversarial Robustness via Promoting Ensemble Diversity

Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29
モデルの頑健性保証
敵対的学習
深層学習手法

Sitatapatra: Blocking the Transfer of Adversarial Samples

Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21
モデルの頑健性保証
敵対的サンプル
非転送性検出

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography

Authors: Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas | Published: 2019-01-23 | Updated: 2019-04-10
MPCアルゴリズム
分散学習
差分プライバシー

Universal Rules for Fooling Deep Neural Networks based Text Classification

Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03
トリガーの検知
敵対的サンプル
深層学習手法

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism

Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21
テロ攻撃データ分類
モデル評価手法
深層学習手法

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14
トリガーの検知
モデル評価
敵対的攻撃手法