トリガーの検知

Reaching Data Confidentiality and Model Accountability on the CalTrain

Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07
トリガーの検知
パフォーマンス評価
連合学習

MOBIUS: Model-Oblivious Binarized Neural Networks

Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29
トリガーの検知
プライバシー保護機械学習
差分プライバシー

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
トリガーの検知
モデル性能評価
暗号化技術

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20
トリガーの検知
メンバーシップ推論
暗号プロトコル

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13
トリガーの検知
悪意のあるコンテンツ生成
攻撃の評価

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15
トリガーの検知
ロバスト性向上
攻撃の評価

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27
トリガーの検知
数理的解析
敵対的学習

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09
クエリ生成手法
トリガーの検知
ポイズニング

Adversarial Attack Type I: Cheat Classifiers by Significant Changes

Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22
トリガーの検知
ロバスト性分析
敵対的移転性

2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem

Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23
トリガーの検知
プライバシー評価
モデルの設計や精度