透かし技術

Local Convolutions Cause an Implicit Bias towards High Frequency Adversarial Examples

Authors: Josue Ortega Caro, Yilong Ju, Ryan Pyle, Sourav Dey, Wieland Brendel, Fabio Anselmi, Ankit Patel | Published: 2020-06-19 | Updated: 2023-03-08
敵対的サンプル
敵対的学習
透かし技術

Robust Federated Recommendation System

Authors: Chen Chen, Jingfeng Zhang, Anthony K. H. Tung, Mohan Kankanhalli, Gang Chen | Published: 2020-06-15
アルゴリズム設計
ポイズニング
透かし技術

Confusing and Detecting ML Adversarial Attacks with Injected Attractors

Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08
敵対的摂動手法
透かし技術
防御手法

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30
敵対的スペクトル攻撃検出
深層学習手法
透かし技術

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
敵対的攻撃手法
深層学習技術
透かし技術

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16
メンバーシップ推論
敵対的サンプル
透かし技術

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
パフォーマンス評価
脅威モデル
透かし技術

How Robust are Deep Neural Networks?

Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30
モデルの頑健性保証
深層学習に基づくIDS
透かし技術

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11
性能評価手法
透かし技術
音声認識システムのセキュリティ

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
敵対的学習
敵対的攻撃手法
透かし技術