防御手法

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective

Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14
敵対的学習
最適化アルゴリズムの選択と評価
防御手法

Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10
ポイズニング
敵対的学習
防御手法

Adversarial Attack Generation Empowered by Min-Max Optimization

Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01
敵対的学習
深層学習
防御手法

Robustness for Non-Parametric Classification: A Generic Attack and Defense

Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri | Published: 2019-06-07 | Updated: 2020-02-24
ロバスト分類
敵対的学習
防御手法

On Configurable Defense against Adversarial Example Attacks

Authors: Bo Luo, Min Li, Yu Li, Qiang Xu | Published: 2018-12-06
敵対的サンプル
敵対的学習
防御手法

Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples

Authors: Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li | Published: 2018-12-05 | Updated: 2020-01-20
モデルの頑健性保証
敵対的サンプル
防御手法

Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness

Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30
モデルの頑健性保証
ロバスト性向上
防御手法

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11
ロバスト分類
敵対的学習
防御手法

Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples

Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20
ロバスト性向上
敵対的学習
防御手法

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
バックドアモデルの検知
暗号化技術
防御手法