Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods Authors: Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, Himabindu Lakkaraju | Published: 2019-11-06 | Updated: 2020-02-03 XAI(説明可能なAI)敵対的学習説明可能性に対する攻撃 2019.11.06 2025.04.03 文献データベース
Adversarial Example Detection by Classification for Deep Speech Recognition Authors: Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan | Published: 2019-10-22 敵対的学習敵対的移転性音声アシスタントの誤作動 2019.10.22 2025.04.03 文献データベース
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 セキュリティ分析性能評価敵対的学習 2019.09.13 2025.04.03 文献データベース
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 性能評価敵対的サンプル敵対的学習 2019.09.13 2025.04.03 文献データベース
Black-box Adversarial ML Attack on Modulation Classification Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01 情報セキュリティ敵対的学習深層学習手法 2019.08.01 2025.04.03 文献データベース
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04 敵対的学習物理層セキュリティ通信モデル 2019.08.01 2025.04.03 文献データベース
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 攻撃の分類敵対的サンプル敵対的学習 2019.07.30 2025.04.03 文献データベース
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16 敵対的サンプル敵対的学習防御手法 2019.06.14 2025.04.03 文献データベース
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14 DNN IP保護手法敵対的学習深層学習 2019.06.11 2025.04.03 文献データベース
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14 敵対的学習最適化アルゴリズムの選択と評価防御手法 2019.06.10 2025.04.03 文献データベース