機械学習技術

Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning

Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21
攻撃の評価
敵対的訓練
機械学習技術

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
敵対的サンプルの検知
敵対的摂動手法
機械学習技術

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
敵対的サンプルの検知
敵対的摂動手法
機械学習技術

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24
探索的攻撃
敵対的摂動手法
機械学習技術

Explaining Black-box Android Malware Detection

Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29
機械学習技術
特徴重要性分析
静的マルウェア検出

Stochastic Activation Pruning for Robust Adversarial Defense

Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05
敵対的サンプルの検知
敵対的学習
機械学習技術

Label Sanitization against Label Flipping Poisoning Attacks

Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02
敵対的攻撃分析
機械学習技術
毒データの検知

Online Feature Ranking for Intrusion Detection Systems

Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15
MLベースのIDS
データ収集手法
機械学習技術

Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain

Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27
データ収集
モデル評価手法
機械学習技術

Generalized Byzantine-tolerant SGD

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23
ロバスト推定
敵対的攻撃分析
機械学習技術