透かし技術

Confusing and Detecting ML Adversarial Attacks with Injected Attractors

Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08
敵対的摂動手法
透かし技術
防御手法

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30
敵対的スペクトル攻撃検出
深層学習手法
透かし技術

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
敵対的攻撃手法
深層学習技術
透かし技術

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16
メンバーシップ推論
敵対的サンプル
透かし技術

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
パフォーマンス評価
脅威モデル
透かし技術

How Robust are Deep Neural Networks?

Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30
モデルの頑健性保証
深層学習に基づくIDS
透かし技術

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11
性能評価手法
透かし技術
音声認識システムのセキュリティ

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
敵対的学習
敵対的攻撃手法
透かし技術

Learning More Robust Features with Adversarial Training

Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20
対抗的学習
敵対的学習
透かし技術

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
敵対的サンプルの検知
敵対的攻撃手法
透かし技術