攻撃手法

MEADE: Towards a Malicious Email Attachment Detection Engine

Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22
サイバーセキュリティ
攻撃手法
敵対的サンプルの検知

Neural Trojans

Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03
バックドアモデルの検知
攻撃手法
深層学習

On Security and Sparsity of Linear Classifiers for Adversarial Settings

Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31
メンバーシップ推論
ロバスト性分析
攻撃手法

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16
プライバシー保護手法
攻撃手法
数理的解析

Practical Attacks Against Graph-based Clustering

Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29
コミュニティ検出
ポイズニング
攻撃手法

Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge

Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25
モデル抽出攻撃
ロジックロッキング
攻撃手法

Evasion Attacks against Machine Learning at Test Time

Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli | Published: 2017-08-21
マシン・アンラーニング
ロバスト性分析
攻撃手法

Learning Universal Adversarial Perturbations with Generative Models

Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05
モデルの頑健性保証
攻撃手法
敵対的サンプル

ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models

Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02
ポイズニング
モデルの頑健性保証
攻撃手法

Cascade Adversarial Machine Learning Regularized with a Unified Embedding

Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17
ロバスト性分析
攻撃手法
敵対的学習