透かし評価

Detecting Adversarial Examples via Key-based Network

Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02
敵対的学習
敵対的移転性
透かし評価

Tokenized Data Markets

Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31
データ流分析
投票メカニズム
透かし評価

Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations

Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13
モデルの頑健性保証
モデル抽出攻撃の検知
透かし評価

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data

Authors: Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan | Published: 2018-05-31
敵対的移転性
特徴重要度分析
透かし評価

ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-05-30
敵対的移転性
透かし評価

Android Malware Detection based on Factorization Machine

Authors: Chenglin Li, Keith Mills, Rui Zhu, Di Niu, Hongwen Zhang, Husam Kinawi | Published: 2018-05-30 | Updated: 2019-08-13
サイバーセキュリティ
特徴重要度分析
透かし評価

AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks

Authors: Chun-Chen Tu, Paishun Ting, Pin-Yu Chen, Sijia Liu, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Shin-Ming Cheng | Published: 2018-05-30 | Updated: 2020-01-31
クエリ生成手法
敵対的サンプルの検知
透かし評価

Adversarial Noise Attacks of Deep Learning Architectures — Stability Analysis via Sparse Modeled Signals

Authors: Yaniv Romano, Aviad Aberdam, Jeremias Sulam, Michael Elad | Published: 2018-05-29 | Updated: 2019-08-05
スパース性最適化
モデルの頑健性保証
透かし評価

FairGAN: Fairness-aware Generative Adversarial Networks

Authors: Depeng Xu, Shuhan Yuan, Lu Zhang, Xintao Wu | Published: 2018-05-28
フェアネス学習
公平性のあるAIモデルの作成
透かし評価