Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 2020.08.25 2025.05.13 Literature Database
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24 2020.08.24 2025.05.13 Literature Database
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23 2020.08.23 2025.05.13 Literature Database
Multiple Classification with Split Learning Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11 2020.08.22 2025.05.13 Literature Database
On the Intrinsic Differential Privacy of Bagging Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22 2020.08.22 2025.05.13 Literature Database
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14 2020.08.21 2025.05.13 Literature Database
Defending Distributed Classifiers Against Data Poisoning Attacks Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21 2020.08.21 2025.05.13 Literature Database
Defending Regression Learners Against Poisoning Attacks Authors: Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz | Published: 2020-08-21 2020.08.21 2025.05.13 Literature Database
A(DP)$^2$SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent with Differential Privacy Authors: Jie Xu, Wei Zhang, Fei Wang | Published: 2020-08-21 2020.08.21 2025.05.13 Literature Database
PicoDomain: A Compact High-Fidelity Cybersecurity Dataset Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang | Published: 2020-08-20 2020.08.20 2025.05.13 Literature Database