透かし技術

Learning More Robust Features with Adversarial Training

Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20
対抗的学習
敵対的学習
透かし技術

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
敵対的サンプルの検知
敵対的攻撃手法
透かし技術

Secure $k$-ish Nearest Neighbors Classifier

Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30
安全な算術計算
機械学習手法
透かし技術

Gazelle: A Low Latency Framework for Secure Neural Network Inference

Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16
安全な算術計算
暗号化技術
透かし技術

BinPro: A Tool for Binary Source Code Provenance

Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02
機械学習
透かし技術
類似性測定

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01
セキュリティ情報管理
機械学習
透かし技術