Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework Authors: Huafei Zhu, Zengxiang Li, Mervyn Cheah, Rick Siow Mong Goh | Published: 2020-03-17 | Updated: 2020-04-08 Secure AggregationPrivacy Protection MethodFederated Learning 2020.03.17 2025.05.28 Literature Database
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26 Training MethodState Transition ModelVulnerability Attack Method 2020.03.17 2025.05.28 Literature Database
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.15 2025.05.28 Literature Database
Certified Defenses for Adversarial Patches Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25 RobustnessVulnerability Attack MethodDefense Method 2020.03.14 2025.05.28 Literature Database
A Survey of Adversarial Learning on Graphs Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05 PoisoningAdversarial Attack MethodsDefense Method 2020.03.10 2025.05.28 Literature Database
Manifold Regularization for Locally Stable Deep Neural Networks Authors: Charles Jin, Martin Rinard | Published: 2020-03-09 | Updated: 2020-09-22 Training MethodRobustnessAdversarial Example 2020.03.09 2025.05.28 Literature Database
Towards Probabilistic Verification of Machine Unlearning Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01 Training MethodBackdoor AttackBackdoor Attack Mitigation 2020.03.09 2025.05.28 Literature Database
Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12 Adversarial ExampleAdversarial attackGenerative Model 2020.03.09 2025.05.28 Literature Database
Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26 Game TheoryPoisoningAdversarial Attack Methods 2020.03.08 2025.05.28 Literature Database
Some Geometrical and Topological Properties of DNNs’ Decision Boundaries Authors: Bo Liu, Mengya Shen | Published: 2020-03-07 | Updated: 2021-04-16 Robustness EvaluationMathematical FoundationsFundamentals of Machine Learning 2020.03.07 2025.05.28 Literature Database