An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks Authors: Chirag Agarwal, Bo Dong, Dan Schonfeld, Anthony Hoogs | Published: 2018-06-05 | Updated: 2018-06-06 敵対的サンプルの検知敵対的移転性透かし評価 2018.06.05 2025.04.03 文献データベース
PAC-learning in the presence of evasion adversaries Authors: Daniel Cullina, Arjun Nitin Bhagoji, Prateek Mittal | Published: 2018-06-05 | Updated: 2018-06-06 モデルの頑健性保証損失関数敵対的移転性 2018.06.05 2025.04.03 文献データベース
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise Authors: Vahid Behzadan, Arslan Munir | Published: 2018-06-04 モデルの頑健性保証強化学習敵対的サンプル 2018.06.04 2025.04.03 文献データベース
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14 メンバーシップ推論モデル抽出攻撃透かし評価 2018.06.04 2025.04.03 文献データベース
Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks Authors: Yarin Gal, Lewis Smith | Published: 2018-06-02 | Updated: 2018-06-28 ラベル不確実性敵対的サンプル敵対的移転性 2018.06.02 2025.04.03 文献データベース
Detecting Adversarial Examples via Key-based Network Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02 敵対的学習敵対的移転性透かし評価 2018.06.02 2025.04.03 文献データベース
Tokenized Data Markets Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31 データ流分析投票メカニズム透かし評価 2018.05.31 2025.04.03 文献データベース
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31 トリガーの検知敵対的サンプルの検知深層学習手法 2018.05.31 2025.04.03 文献データベース
Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders Authors: Partha Ghosh, Arpan Losalka, Michael J Black | Published: 2018-05-31 | Updated: 2018-12-10 モデルの頑健性保証損失関数敵対的サンプル 2018.05.31 2025.04.03 文献データベース
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13 モデルの頑健性保証モデル抽出攻撃の検知透かし評価 2018.05.31 2025.04.03 文献データベース