{"id":1668,"date":"2022-04-01T04:00:00","date_gmt":"2022-03-31T19:00:00","guid":{"rendered":"https:\/\/devneko.jp\/wordpress\/?p=1668"},"modified":"2022-04-01T04:00:00","modified_gmt":"2022-03-31T19:00:00","slug":"pidan%e3%83%90%e3%83%83%e3%82%af%e3%83%89%e3%82%a2%e6%94%bb%e6%92%83%e3%81%ae%e6%a4%9c%e5%87%ba%e6%89%8b%e6%b3%95","status":"publish","type":"post","link":"https:\/\/devneko.jp\/wordpress\/?p=1668","title":{"rendered":"PiDAn:\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u306e\u691c\u51fa\u624b\u6cd5"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li><strong>PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks\u00a0<\/strong>[22.9]<br>\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u306f\u30c7\u30a3\u30fc\u30d7\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af(DNN)\u306b\u65b0\u305f\u306a\u8105\u5a01\u3092\u3082\u305f\u3089\u3059 \u6c5a\u67d3\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3092\u6d44\u5316\u3059\u308b\u30b3\u30d2\u30fc\u30ec\u30f3\u30b9\u6700\u9069\u5316\u306b\u57fa\u3065\u304f\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3067\u3042\u308bPiDAn\u3092\u63d0\u6848\u3059\u308b\u3002 \u5f53\u793e\u306ePiDAn\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306f90%\u4ee5\u4e0a\u306e\u611f\u67d3\u30af\u30e9\u30b9\u3092\u691c\u51fa\u3067\u304d\u300195%\u306e\u6709\u6bd2\u30b5\u30f3\u30d7\u30eb\u3092\u8b58\u5225\u3067\u304d\u308b\u3002<br><a href=\"http:\/\/arxiv.org\/abs\/2203.09289v1\">\u8ad6\u6587<\/a>\u00a0\u00a0<a href=\"https:\/\/fugumt.com\/fugumt\/paper_check\/2203.09289v1\">\u53c2\u8003\u8a33\uff08\u30e1\u30bf\u30c7\u30fc\u30bf\uff09<\/a>\u00a0 \u00a0(Thu, 17 Mar 2022 12:37:21 GMT)<ul><li>\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u306b\u5bfe\u3057\u3066\u672c\u7269\u306e\u30c7\u30fc\u30bf\u3068\u6709\u5bb3\u306a\uff08\u6709\u6bd2\u306a\uff09\u30c7\u30fc\u30bf\u3092\u898b\u5206\u3051\u308b\u624b\u6cd5\u306e\u63d0\u6848\u3002GTSRB\u3001ILSVRC2012\u30c7\u30fc\u30bf\u30bb\u30c3\u30c8\u3067\u6709\u52b9\u6027\u3092\u691c\u8a3c\u3068\u306e\u3053\u3068\u3002<\/li><\/ul><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks\u00a0 &hellip; <a href=\"https:\/\/devneko.jp\/wordpress\/?p=1668\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;PiDAn:\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u306e\u691c\u51fa\u624b\u6cd5&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[44],"class_list":["post-1668","post","type-post","status-publish","format-standard","hentry","category-arxiv","tag-backdoor"],"_links":{"self":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1668"}],"version-history":[{"count":0,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1668\/revisions"}],"wp:attachment":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}