脆弱性分析

Who’s Afraid of Adversarial Transferability?

Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06
敵対的サンプル
敵対的サンプルの脆弱性
脆弱性分析

Stealthy Backdoors as Compression Artifacts

Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30
バックドア攻撃
モデル圧縮のリスク
脆弱性分析

Automated Software Vulnerability Assessment with Concept Drift

Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21
パフォーマンス評価
概念漂流
脆弱性分析

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
モデル性能評価
敵対的攻撃
脆弱性分析

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04
ゲーム理論
深層強化学習
脆弱性分析

On the relationship between class selectivity, dimensionality, and robustness

Authors: Matthew L. Leavitt, Ari S. Morcos | Published: 2020-07-08 | Updated: 2020-10-13
ポイズニング
敵対的学習
脆弱性分析

Hidden Cost of Randomized Smoothing

Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12
ロバスト性評価
最適化手法
脆弱性分析

Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond

Authors: Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh | Published: 2020-02-28 | Updated: 2020-10-26
ロバスト性評価
脆弱性分析
防御手法

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27
プライバシー保護データマイニング
攻撃タイプ
脆弱性分析

Models and Framework for Adversarial Attacks on Complex Adaptive Systems

Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13
強化学習アルゴリズム
攻撃検出
脆弱性分析