敵対的サンプル

DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning

Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31
DNN IP保護手法
攻撃検出
敵対的サンプル

Fine-grained Private Knowledge Distillation

Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06
プライバシー手法
敵対的サンプル
機械学習

Careful What You Wish For: on the Extraction of Adversarially Trained Models

Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21
ポイズニング
攻撃手法
敵対的サンプル

One-vs-the-Rest Loss to Focus on Important Samples in Adversarial Training

Authors: Sekitoshi Kanai, Shin'ya Yamaguchi, Masanori Yamada, Hiroshi Takahashi, Kentaro Ohno, Yasutoshi Ida | Published: 2022-07-21 | Updated: 2023-04-26
敵対的サンプル
適応型敵対的訓練
難易度の高いサンプル

How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection

Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28
アルゴリズム設計
敵対的サンプル
計算効率

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11
アルゴリズム設計
形式的検証
敵対的サンプル

The Role of Machine Learning in Cybersecurity

Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20
商用ML製品の問題
敵対的サンプル
機械学習の役割

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
一般化の影響
性能評価
敵対的サンプル

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
アルゴリズム設計
敵対的サンプル
敵対的攻撃検出

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15
ロバスト性
敵対的サンプル
敵対的攻撃手法