Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Ara Vartanian"'
Publikováno v:
AAAI
While machine learning systems are known to be vulnerable to data-manipulation attacks at both training and deployment time, little is known about how to adapt attacks when the defender transforms data prior to model estimation. We consider the setti
Publikováno v:
Proceedings of the ACM on Programming Languages. 1:1-26
Binary rewriters are tools that are used to modify the functionality of binaries lacking source code. Binary rewriters can be used to rewrite binaries for a variety of purposes including optimization, hardening, and extraction of executable component
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030015534
GameSec
GameSec
We introduce a form of steganography in the domain of machine learning which we call training set camouflage. Imagine Alice has a training set on an illicit machine learning classification task. Alice wants Bob (a machine learning system) to learn th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3024981b6dd26189dca090b7dc0a1fc0
https://doi.org/10.1007/978-3-030-01554-1_4
https://doi.org/10.1007/978-3-030-01554-1_4