攻撃の評価

Defending Neural Backdoors via Generative Distribution Modeling

Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06
バックドア攻撃
攻撃の評価
生成的敵対ネットワーク

Membership Model Inversion Attacks for Deep Networks

Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09
攻撃の評価
攻撃者や悪意のあるデバイス
生成的敵対ネットワーク

SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations

Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08
攻撃の評価
敵対的サンプル
敵対的攻撃手法

Detecting AI Trojans Using Meta Neural Analysis

Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01
バックドア攻撃
ポイズニング
攻撃の評価

A Case Study on Using Deep Learning for Network Intrusion Detection

Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05
データ収集
攻撃の評価
機械学習アルゴリズム

Adversarial Examples for Cost-Sensitive Classifiers

Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04
ポイズニング
攻撃の評価
敵対的攻撃手法

False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics

Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13
サイバー脅威
攻撃の評価
機械学習アルゴリズム

BUZz: BUffer Zones for defending adversarial examples in image classification

Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16
ポイズニング
攻撃の評価
敵対的攻撃手法

A Data Science Approach for Honeypot Detection in Ethereum

Authors: Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State | Published: 2019-10-03 | Updated: 2019-12-19
スマートコントラクト
攻撃の評価
機械学習アルゴリズム

Piracy Resistant Watermarks for Deep Neural Networks

Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng | Published: 2019-10-02 | Updated: 2020-12-02
プロンプトインジェクション
メンバーシップ推論
攻撃の評価