all InfoSec news
How many dimensions are required to find an adversarial example?. (arXiv:2303.14173v1 [cs.LG])
March 27, 2023, 1:10 a.m. | Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler
cs.CR updates on arXiv.org arxiv.org
Past work exploring adversarial vulnerability have focused on situations
where an adversary can perturb all dimensions of model input. On the other
hand, a range of recent works consider the case where either (i) an adversary
can perturb a limited number of input parameters or (ii) a subset of modalities
in a multimodal problem. In both of these cases, adversarial examples are
effectively constrained to a subspace $V$ in the ambient input space
$\mathcal{X}$. Motivated by this, in this work …
adversarial adversary ambient case cases effectively find input problem space vulnerability work
More from arxiv.org / cs.CR updates on arXiv.org
One-shot Empirical Privacy Estimation for Federated Learning
1 day, 9 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
1 day, 9 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
1 day, 9 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
1 day, 9 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Staff DFIR Investigator
@ SentinelOne | United States - Remote
Senior Consultant.e (H/F) - Product & Industrial Cybersecurity
@ Wavestone | Puteaux, France
Information Security Analyst
@ StarCompliance | York, United Kingdom, Hybrid
Senior Cyber Security Analyst (IAM)
@ New York Power Authority | White Plains, US