攻撃手法

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21
ポイズニング
攻撃手法
敵対的サンプル

Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors

Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06
攻撃手法
敵対的サンプル
画像処理

MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks

Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12
攻撃手法
敵対的サンプル
防御手法の効果分析

Reducing audio membership inference attack accuracy to chance: 4 defenses

Authors: Michael Lomnitz, Nina Lopatina, Paul Gamble, Zigfried Hampel-Arias, Lucas Tindall, Felipe A. Mejia, Maria Alejandra Barrios | Published: 2019-10-31
プライバシー管理
攻撃手法
防御手法の効果分析

Certifiable Robustness to Graph Perturbations

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19
GNN
攻撃手法
脆弱性評価手法

A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning

Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30
収束性分析
攻撃手法
毒性攻撃に特化した内容

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30
ポイズニング
攻撃手法
敵対的サンプル

Privacy Enhanced Multimodal Neural Representations for Emotion Recognition

Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29
プライバシー管理
攻撃手法
評価指標

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

Authors: Anuj Dubey, Rosario Cammarota, Aydin Aysu | Published: 2019-10-29 | Updated: 2019-12-02
メンバーシップ推論
攻撃手法
防御手法の効果分析

Active Subspace of Neural Networks: Structural Analysis and Universal Attacks

Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29
モデル圧縮のリスク
攻撃手法
次元削減手法