ポイズニング

Generative Models for Security: Attacks, Defenses, and Opportunities

Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29
ポイズニング
攻撃手法
生成モデル

Understanding the Security of Deepfake Detection

Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06
ポイズニング
深層学習技術
顔認識システム

Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning

Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07
ポイズニング
連合学習
適応型敵対的訓練

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
バックドア攻撃
ポイズニング
機械学習

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31
データ汚染検出
ポイズニング
最適化手法

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
ポイズニング
敵対的攻撃
脆弱性評価手法

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05
ポイズニング
ラベル不確実性
敵対的訓練

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
データ汚染検出
ポイズニング
脆弱性評価手法

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
ポイズニング
最適化手法
脆弱性評価手法

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20
ウォーターマーキング
データの起源と変遷
ポイズニング