Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning Authors: Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen | Published: 2024-02-19 | Updated: 2024-03-29 バックドアモデルの検知攻撃手法防御手法 2024.02.19 2025.04.03 文献データベース
Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks Authors: Satwik Kundu, Debarshi Kundu, Swaroop Ghosh | Published: 2024-02-18 データセット生成モデル抽出攻撃防御手法 2024.02.18 2025.04.03 文献データベース
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06 プライバシー保護手法ラベル推論攻撃防御手法 2024.02.06 2025.04.03 文献データベース
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19 ウォーターマーキング敵対的攻撃防御手法 2024.01.19 2025.04.03 文献データベース
Defenses in Adversarial Machine Learning: A Survey Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13 ポイズニング敵対的サンプル防御手法 2023.12.13 2025.04.03 文献データベース
Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07 ウォーターマーキング防御手法 2023.12.07 2025.04.03 文献データベース
Transfer Attacks and Defenses for Large Language Models on Coding Tasks Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22 プロンプトインジェクション敵対的攻撃防御手法 2023.11.22 2025.04.03 文献データベース
Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13 敵対的テキスト浄化最適化問題防御手法 2023.11.13 2025.04.03 文献データベース
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 学習の改善深層学習手法防御手法 2023.11.11 2025.04.03 文献データベース
Does Differential Privacy Prevent Backdoor Attacks in Practice? Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10 データプライバシー評価トレードオフ分析防御手法 2023.11.10 2025.04.03 文献データベース