敵対的学習

Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems

Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11
ポイズニング
攻撃タイプ
敵対的学習

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
ネットワークスライシング
リスク評価手法
敵対的学習

IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31
アルゴリズム設計
効率的証明システム
敵対的学習

Private Graph Extraction via Feature Explanations

Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02
DFLに対する攻撃手法
プライバシーリスク管理
敵対的学習

A Framework for Understanding Model Extraction Attack and Defense

Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23
アルゴリズム設計
メンバーシップ推論
敵対的学習

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22
DNN IP保護手法
敵対的学習
評価手法

The Privacy Onion Effect: Memorization is Relative

Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22
メンバーシップ推論
ラベル推論攻撃
敵対的学習

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
敵対的学習
敵対的攻撃
脅威モデル

Reconstructing Training Data from Trained Neural Networks

Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05
ハイパーパラメータ調整
性能評価指標
敵対的学習

Learn to Adapt: Robust Drift Detection in Security Domain

Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15
ドリフト検出手法
性能評価指標
敵対的学習