Luring of transferable adversarial perturbations in the black-box paradigm Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2020-04-10 | Updated: 2021-03-03 堅牢性向上手法攻撃の評価敵対的サンプル 2020.04.10 2025.04.03 文献データベース
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 攻撃の評価脆弱性評価手法防御手法 2020.04.09 2025.04.03 文献データベース
Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07 ロバスト性に関する評価攻撃の評価最大カバレッジ問題 2020.04.07 2025.04.03 文献データベース
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 ポイズニング攻撃の評価防御手法 2020.04.01 2025.04.03 文献データベース
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30 ポイズニング攻撃の評価敵対的攻撃手法 2019.10.14 2025.04.03 文献データベース
Eavesdrop the Composition Proportion of Training Labels in Federated Learning Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27 バックドア攻撃ポイズニング攻撃の評価 2019.10.14 2025.04.03 文献データベース
Policy Poisoning in Batch Reinforcement Learning and Control Authors: Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu | Published: 2019-10-13 | Updated: 2019-10-31 強化学習環境攻撃の評価攻撃者や悪意のあるデバイス 2019.10.13 2025.04.03 文献データベース
On Robustness of Neural Ordinary Differential Equations Authors: Hanshu Yan, Jiawei Du, Vincent Y. F. Tan, Jiashi Feng | Published: 2019-10-12 | Updated: 2022-03-03 モデルの設計や精度攻撃の評価防御手法の効果分析 2019.10.12 2025.04.03 文献データベース
Extraction of Complex DNN Models: Real Threat or Boogeyman? Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan | Published: 2019-10-11 | Updated: 2020-05-27 Out-of-Distribution検出モデルの設計や精度攻撃の評価 2019.10.11 2025.04.03 文献データベース
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11 攻撃の評価敵対的攻撃手法音声認識技術 2019.10.11 2025.04.03 文献データベース