脆弱性評価手法

Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models

Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11
敵対的訓練
脆弱性評価手法
計算効率

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
ポイズニング
敵対的攻撃
脆弱性評価手法

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27
プライバシー保護手法
情報理論的評価
脆弱性評価手法

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
データ汚染検出
ポイズニング
脆弱性評価手法

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
ポイズニング
最適化手法
脆弱性評価手法

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26
モデル保護手法
脆弱性評価手法
防御メカニズム

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24
最適化手法
脆弱性評価手法
防御メカニズム

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18
ロバスト性向上手法
敵対的サンプル
脆弱性評価手法

SoK: Certified Robustness for Deep Neural Networks

Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12
形式的検証
深層学習技術
脆弱性評価手法

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12
セキュリティ保証
プライバシー評価
脆弱性評価手法