敵対的攻撃手法

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
モデル性能評価
敵対的サンプル
敵対的攻撃手法

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15
ポイズニング
敵対的サンプル
敵対的攻撃手法

On Robustness to Adversarial Examples and Polynomial Optimization

Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12
モデル性能評価
敵対的攻撃手法
計算問題

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
モデル性能評価
敵対的攻撃手法
特徴エンジニアリング

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
モデル性能評価
敵対的攻撃手法
知識移転性

Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks

Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30
ポイズニング
攻撃の評価
敵対的攻撃手法

Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11
攻撃の評価
敵対的攻撃手法
音声認識技術

Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system

Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09
敵対的サンプル
敵対的攻撃手法
適応型敵対的訓練

Deep Latent Defence

Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27
敵対的サンプル
敵対的攻撃手法
適応型敵対的訓練

Adversarial Learning of Deepfakes in Accounting

Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09
データ整合性制約
敵対的攻撃手法
生成的敵対ネットワーク