No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy” Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29 データ保護手法プライバシー評価モデル設計 2022.09.29 2025.04.03 文献データベース
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30 DNN IP保護手法モデル設計深層学習手法 2022.09.28 2025.04.03 文献データベース
Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation Authors: Qiongxiu Li, Jaron Skovsted Gundersen, Katrine Tjell, Rafal Wisniewski, Mads Græsbøll Christensen | Published: 2022-09-16 プライバシー分析モデル設計多者計算 2022.09.16 2025.04.03 文献データベース
M^4I: Multi-modal Models Membership Inference Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15 プライバシー分析モデル設計深層学習手法 2022.09.15 2025.04.03 文献データベース
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 モデル設計敵対的攻撃検出深層学習手法 2022.09.14 2025.04.03 文献データベース
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 モデル抽出攻撃モデル設計深層学習手法 2022.09.14 2025.04.03 文献データベース
A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 モデル設計敵対的攻撃検出最適化戦略 2022.09.13 2025.04.03 文献データベース
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 モデル設計侵入検知システム機械学習手法 2022.09.12 2025.04.03 文献データベース
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 DNN IP保護手法プライバシー分析モデル設計 2022.09.12 2025.04.03 文献データベース
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 モデル設計敵対的攻撃検出防御メカニズム 2022.09.09 2025.04.03 文献データベース