{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00234833","sets":["1164:5352:11553:11625"]},"path":["11625"],"owner":"44499","recid":"234833","title":["敵対的サンプルにおける転移性の定量的評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-06-13"},"_buckets":{"deposit":"ce73cd3b-f881-476b-943c-7e728dc42b5b"},"_deposit":{"id":"234833","pid":{"type":"depid","value":"234833","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"敵対的サンプルにおける転移性の定量的評価","author_link":["640589","640592","640591","640593","640594","640597","640590","640596","640598","640595"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"敵対的サンプルにおける転移性の定量的評価"},{"subitem_title":"Evaluation of Transferability for Adversarial Examples","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"情報論的学習理論と機械学習2","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-06-13","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"名城大学"},{"subitem_text_value":"名城大学"},{"subitem_text_value":"名城大学"},{"subitem_text_value":"名城大学"},{"subitem_text_value":"名城大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Meijo University","subitem_text_language":"en"},{"subitem_text_value":"Meijo University","subitem_text_language":"en"},{"subitem_text_value":"Meijo University","subitem_text_language":"en"},{"subitem_text_value":"Meijo University","subitem_text_language":"en"},{"subitem_text_value":"Meijo University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/234833/files/IPSJ-BIO24078006.pdf","label":"IPSJ-BIO24078006.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-BIO24078006.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"41"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"0e5eb86b-446f-4e8b-83ca-0c0337486db7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"加藤, 駿一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"熊谷, 瞭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"竹本, 修"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"野崎, 佑典"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉川, 雅弥"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shunichi, Kato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryo, Kumagai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shu, Taketomo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yusuke, Nozaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaya, Yoshikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12055912","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8590","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"AI に対する脅威として敵対的サンプル(Adversarial Example:AE)が報告されている.AE は,入力画像に微小なノイズを加えることで推論結果を誤認識させる攻撃である.近年,この AE の転移性と呼ばれる性質を用いた転移攻撃も報告されている.しかし,これまでに転移攻撃への対策に関する評価はほとんど行われていない.そこで本研究では,フィルタリングや Test-Time Augmentation(TTA)を用いた対策手法を構築し,転移攻撃に対する耐性を定量的に評価する.実験結果から,これらの対策手法が転移攻撃に対する対策として有効であると示した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Adversarial Example (AE) has been reported as a threat to AI. AE is an attack that misclassify prediction results by adding small noise to the input image. Recently, Transferable Adversarial Attack based on Adversarial Example transferability has also been reported. However, there have been few evaluations of countermeasures against Transferable Adversarial Attack. Therefore, this study constructs the countermeasures against it, which are based on filtering and Test Time Augmentation (TTA) in order to evaluate the vulnerability. Experiments show the validity of these countermeasures.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告バイオ情報学(BIO)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-06-13","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2024-BIO-78"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":234833,"updated":"2025-01-19T09:41:52.587847+00:00","links":{},"created":"2025-01-19T01:36:40.972122+00:00"}