On the relationship between class selectivity, dimensionality, and robustness Authors: Matthew L. Leavitt, Ari S. Morcos | Published: 2020-07-08 | Updated: 2020-10-13 PoisoningAdversarial LearningVulnerability Analysis 2020.07.08 2025.05.28 Literature Database
How benign is benign overfitting? Authors: Amartya Sanyal, Puneet K Dokania, Varun Kanade, Philip H. S. Torr | Published: 2020-07-08 Adversarial ExampleAdversarial LearningOverfitting and Memorization 2020.07.08 2025.05.28 Literature Database
BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08 Performance EvaluationPrivacy AssessmentAttack Pattern Extraction 2020.07.08 2025.05.28 Literature Database
Defending against Backdoors in Federated Learning with Robust Learning Rate Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Yulia R. Gel | Published: 2020-07-07 | Updated: 2021-07-29 Backdoor AttackAdversarial LearningDefense Mechanism 2020.07.07 2025.05.28 Literature Database
Backdoor attacks and defenses in feature-partitioned collaborative learning Authors: Yang Liu, Zhihao Yi, Tianjian Chen | Published: 2020-07-07 PoisoningAdversarial LearningDefense Mechanism 2020.07.07 2025.05.28 Literature Database
Stochastic Linear Bandits Robust to Adversarial Attacks Authors: Ilija Bogunovic, Arpan Losalka, Andreas Krause, Jonathan Scarlett | Published: 2020-07-07 | Updated: 2020-10-27 Quantification of UncertaintyAdversarial LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Robust Learning with Frequency Domain Regularization Authors: Weiyu Guo, Yidong Ouyang | Published: 2020-07-07 Adversarial LearningFundamentals of Machine LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability Authors: Utku Ozbulak, Jonathan Peck, Wesley De Neve, Bart Goossens, Yvan Saeys, Arnout Van Messem | Published: 2020-07-07 | Updated: 2020-07-18 Attack Pattern ExtractionAdversarial ExampleAdversarial Learning 2020.07.07 2025.05.28 Literature Database
Sharing Models or Coresets: A Study based on Membership Inference Attack Authors: Hanlin Lu, Changchang Liu, Ting He, Shiqiang Wang, Kevin S. Chan | Published: 2020-07-06 Core Set ConstructionPrivacy AssessmentMembership Inference 2020.07.06 2025.05.28 Literature Database
Descent-to-Delete: Gradient-Based Methods for Machine Unlearning Authors: Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi | Published: 2020-07-06 Data Deletion AlgorithmMachine learningImprovement of Learning 2020.07.06 2025.05.28 Literature Database