脅威モデリング

Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03
サイバーセキュリティ
メンバーシップ推論
脅威モデリング

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23
敵対的サンプルの脆弱性
異常検出手法
脅威モデリング

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems

Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05
医療データの透かし設定
攻撃手法
脅威モデリング

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31
ポイズニング
最大カバレッジ問題
脅威モデリング

The Efficacy of SHIELD under Different Threat Models

Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02
モデルの頑健性保証
敵対的攻撃
脅威モデリング