敵対的攻撃手法

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08
モデルの頑健性保証
敵対的攻撃手法
画像分類解釈

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14
トリガーの検知
モデル評価
敵対的攻撃手法

Exploring Adversarial Examples in Malware Detection

Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13
ポイズニング
敵対的サンプル
敵対的攻撃手法

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18
ロバスト性向上手法
敵対的サンプルの検知
敵対的攻撃手法

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23
モデルの頑健性保証
敵対的学習
敵対的攻撃手法

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09
モデルの頑健性保証
敵対的学習
敵対的攻撃手法

Adversarial Examples – A Complete Characterisation of the Phenomenon

Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17
ロバスト性向上手法
敵対的サンプル
敵対的攻撃手法

Improving the Generalization of Adversarial Training with Domain Adaptation

Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15
ロバスト性向上手法
敵対的学習
敵対的攻撃手法

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks

Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23
モデルの頑健性保証
ロバスト性向上手法
敵対的攻撃手法

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

Authors: Rui Zhu, Tao Shu, Huirong Fu | Published: 2018-09-29
信号伝送のセキュリティ
敵対的攻撃手法
通信モデル