文献データベース

Protection against Cloning for Deep Learning

Authors: Richard Kenway | Published: 2018-03-29
モデル抽出攻撃の検知
敵対的攻撃
深層ネットワークの堅牢性

Defending against Adversarial Images using Basis Functions Transformations

Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16
ウォーターマーキング
モデルの頑健性保証
敵対的攻撃

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14
プライバシー保護
特徴選択手法
統計的分析

Privacy Preserving Machine Learning: Threats and Solutions

Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27
プライバシー保護技術
次元削減手法

Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries

Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27
グラフプライバシー
プライバシー保護
差分プライバシー

Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27
実験的検証
敵対的学習
敵対的攻撃

Resilient Active Information Gathering with Mobile Robots

Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02
プロセス環境
ロボット制御
通信効率

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
敵対的サンプルの検知
敵対的摂動手法
機械学習技術

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
敵対的サンプルの検知
敵対的摂動手法
機械学習技術

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24
探索的攻撃
敵対的摂動手法
機械学習技術