Paper Abstract and Keywords |
Presentation |
2020-05-09 09:30
On Power and limitation of adversarial example attacks Kouichi Sakurai (Kyushu Univ.) COMP2020-5 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a cybersecurity perspective. Research papers on various attacks and defenses have already been published. Some studies have claimed that the adversarial attack are a kind of an intrinsic property of deep learning itself. A famous crypto analysist Adi Shamir introduced combinatorial geometry theory to elucidate the adversarial example attacks and experimentally succeeded to confirm the validity of his attack search algorithm. In this article, in addition to an introduction of Shamir's research, we report recent research progress on the power and limitations of adversarial example attacks. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Deep learning / dversarial examples / activate function / combinatoric geometry / cyber science / / / |
Reference Info. |
IEICE Tech. Rep., vol. 120, no. 13, COMP2020-5, pp. 33-36, May 2020. |
Paper # |
COMP2020-5 |
Date of Issue |
2020-05-02 (COMP) |
ISSN |
Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
COMP2020-5 |
Conference Information |
Committee |
COMP IPSJ-AL |
Conference Date |
2020-05-09 - 2020-05-09 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Online |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
COMP |
Conference Code |
2020-05-COMP |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
On Power and limitation of adversarial example attacks |
Sub Title (in English) |
|
Keyword(1) |
Deep learning |
Keyword(2) |
dversarial examples |
Keyword(3) |
activate function |
Keyword(4) |
combinatoric geometry |
Keyword(5) |
cyber science |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kouichi Sakurai |
1st Author's Affiliation |
Kyushu University (Kyushu Univ.) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2020-05-09 09:30:00 |
Presentation Time |
25 minutes |
Registration for |
COMP |
Paper # |
COMP2020-5 |
Volume (vol) |
vol.120 |
Number (no) |
no.13 |
Page |
pp.33-36 |
#Pages |
4 |
Date of Issue |
2020-05-02 (COMP) |