all InfoSec news
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. (arXiv:2205.10686v2 [cs.CR] UPDATED)
Oct. 18, 2022, 1:20 a.m. | Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
cs.CR updates on arXiv.org arxiv.org
Server breaches are an unfortunate reality on today's Internet. In the
context of deep neural network (DNN) models, they are particularly harmful,
because a leaked model gives an attacker "white-box" access to generate
adversarial examples, a threat model that has no practical robust defenses. For
practitioners who have invested years and millions into proprietary DNNs, e.g.
medical imaging, this seems like an inevitable disaster looming on the horizon.
In this paper, we consider the problem of post-breach recovery for DNN …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Senior SOC Analyst-Weekend Shift
@ Health Care Service Corporation | Dallas (603 Munger Avenue)
Sr. Cyber Security Operations Analyst (Hybrid - Dallas or Houston, TX)
@ AECOM | Houston, TX, United States
Sr. Analyst, Cybersecurity (Lead)
@ Corning | Charlotte, NC, US, 28216