Robust Upper Bounds for Adversarial Training Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06 2021.12.17 2025.05.28 Literature Database
Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives Authors: Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi | Published: 2021-12-16 2021.12.16 2025.05.28 Literature Database
Model Stealing Attacks Against Inductive Graph Neural Networks Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15 2021.12.15 2025.05.28 Literature Database
Few-shot Instruction Prompts for Pretrained Language Models to Detect Social Biases Authors: Shrimai Prabhumoye, Rafal Kocielnik, Mohammad Shoeybi, Anima Anandkumar, Bryan Catanzaro | Published: 2021-12-15 | Updated: 2022-04-15 2021.12.15 2025.05.28 Literature Database
HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing Authors: Xiao Han, Yuncong Yang, Junjie Wu | Published: 2021-12-15 2021.12.15 2025.05.28 Literature Database
Robustifying automatic speech recognition by extracting slowly varying features Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06 2021.12.14 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 2021.12.14 2025.05.28 Literature Database
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14 2021.12.14 2025.05.28 Literature Database
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13 2021.12.13 2025.05.28 Literature Database
Does Fully Homomorphic Encryption Need Compute Acceleration? Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14 2021.12.13 2025.05.28 Literature Database