敵対的サンプルの脆弱性

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23
敵対的サンプルの脆弱性
異常検出手法
脅威モデリング

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29
モデル保護手法
敵対的サンプルの脆弱性
防御メカニズム

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25
敵対的サンプルの脆弱性
最適化手法
無線チャネル検出

Maximum Mean Discrepancy Test is Aware of Adversarial Attacks

Authors: Ruize Gao, Feng Liu, Jingfeng Zhang, Bo Han, Tongliang Liu, Gang Niu, Masashi Sugiyama | Published: 2020-10-22 | Updated: 2021-07-11
敵対的サンプルの脆弱性
検出手法の分析
統計的手法

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
ロバスト性とプライバシーの関係
敵対的サンプルの脆弱性
研究方法論

Beneficial Perturbations Network for Defending Adversarial Examples

Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13
敵対的サンプル
敵対的サンプルの脆弱性
深層学習

Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training

Authors: Alfred Laugros, Alice Caplier, Matthieu Ospici | Published: 2020-08-19
堅牢性向上手法
敵対的サンプル
敵対的サンプルの脆弱性

Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models

Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan | Published: 2020-05-19
攻撃の評価
敵対的サンプル
敵対的サンプルの脆弱性

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25
敵対的サンプルの脆弱性
敵対的攻撃手法
機械学習の応用

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04
データ生成
敵対的サンプルの脆弱性
敵対的移転性