敵対的攻撃

Downscaling Attack and Defense: Turning What You See Back Into What You Get

Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07
攻撃タイプ
敵対的攻撃
画像処理

Adversarial Boot Camp: label free certified robustness in one epoch

Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05
ロバスト性向上手法
学習の改善
敵対的攻撃

Model extraction from counterfactual explanations

Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03
モデル抽出攻撃
因果解釈
敵対的攻撃

Yet Meta Learning Can Adapt Fast, It Can Also Break Easily

Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02
メタ学習手法
敵対的サンプル
敵対的攻撃

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05
敵対的サンプル
敵対的攻撃
深層学習技術

Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics

Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15
強化学習アルゴリズム
敵対的攻撃
最適化戦略

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27
データ生成
テキスト生成手法
敵対的攻撃

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30
データ生成
情報隠蔽手法
敵対的攻撃

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30
敵対的サンプル
敵対的攻撃
深層学習技術

Adversarial Privacy Preserving Graph Embedding against Inference Attack

Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30
プライバシー保護
メンバーシップ推論
敵対的攻撃