A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22 Text Perturbation MethodCauses of Information LeakageMachine Learning Algorithm 2020.10.22 2025.05.28 Literature Database
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22 Malware DetectionMachine Learning MethodWeight Update Method 2020.10.22 2025.05.28 Literature Database
Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22 Dataset evaluationMachine Learning ApplicationAnomaly Detection Method 2020.10.22 2025.05.28 Literature Database
Maximum Mean Discrepancy Test is Aware of Adversarial Attacks Authors: Ruize Gao, Feng Liu, Jingfeng Zhang, Bo Han, Tongliang Liu, Gang Niu, Masashi Sugiyama | Published: 2020-10-22 | Updated: 2021-07-11 Vulnerability of Adversarial ExamplesAnalysis of Detection MethodsStatistical Methods 2020.10.22 2025.05.28 Literature Database
Certified Distributional Robustness on Smoothed Classifiers Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30 Dataset evaluationRobustness Improvement MethodAdversarial Example 2020.10.21 2025.05.28 Literature Database
Amnesiac Machine Learning Authors: Laura Graves, Vineel Nagisetty, Vijay Ganesh | Published: 2020-10-21 Machine UnlearningLegal Compliance 2020.10.21 2025.05.28 Literature Database
Multi-Dimensional Randomized Response Authors: Josep Domingo-Ferrer, Jordi Soria-Comas | Published: 2020-10-21 | Updated: 2020-12-19 Dataset evaluationPrivacy AssuranceMultidimensional Data Analysis 2020.10.21 2025.05.28 Literature Database
VenoMave: Targeted Poisoning Against Speech Recognition Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna | Published: 2020-10-21 | Updated: 2023-04-20 Backdoor AttackPoisoningPoisoning Attack 2020.10.21 2025.05.28 Literature Database
Towards Understanding the Dynamics of the First-Order Adversaries Authors: Zhun Deng, Hangfeng He, Jiaoyang Huang, Weijie J. Su | Published: 2020-10-20 Adversarial LearningOptimization MethodsWeight Update Method 2020.10.20 2025.05.28 Literature Database
Mitigating Sybil Attacks on Differential Privacy based Federated Learning Authors: Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng | Published: 2020-10-20 Attack Methods against DFLPoisoningPoisoning Attack 2020.10.20 2025.05.28 Literature Database