攻撃手法

Adversarial attacks and defenses in explainable artificial intelligence: A survey

Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13
メンバーシップ推論
攻撃手法
敵対的サンプル

Evaluating Privacy Leakage in Split Learning

Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19
プライバシー侵害
プライバシー保護手法
攻撃手法

Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05
サイバー攻撃
ハイパーパラメータ調整
攻撃手法

Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04
サイバー攻撃
プライバシー保護技術
攻撃手法

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24
バックドア攻撃
ポイズニング
攻撃手法

Multi-Player Bandits Robust to Adversarial Collisions

Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15
アルゴリズム設計
攻撃手法
最適化手法

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning

Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14
バックドア攻撃
攻撃手法
自己教師あり学習

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04
クラスタリング手法
ポイズニング
攻撃手法

SNAP: Efficient Extraction of Private Properties with Poisoning

Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21
バックドア攻撃
プロパティ推論
攻撃手法

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15
サイバーセキュリティ
攻撃手法
機械学習技術