Evaluating Ensemble Robustness Against Adversarial Attacks Authors: George Adam, Romain Speciel | Published: 2020-05-12 2020.05.12 2025.05.13 Literature Database
Robustness Verification for Classifier Ensembles Authors: Dennis Gross, Nils Jansen, Guillermo A. Pérez, Stephan Raaijmakers | Published: 2020-05-12 | Updated: 2020-07-09 2020.05.12 2025.05.13 Literature Database
Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18 2020.05.12 2025.05.13 Literature Database
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 2020.05.11 2025.05.13 Literature Database
Provable Robust Classification via Learned Smoothed Densities Authors: Saeed Saremi, Rupesh Srivastava | Published: 2020-05-09 2020.05.09 2025.05.13 Literature Database
Estimating g-Leakage via Machine Learning Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24 2020.05.09 2025.05.13 Literature Database
Cloud-based Federated Boosting for Mobile Crowdsensing Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09 2020.05.09 2025.05.13 Literature Database
Towards Robustness against Unsuspicious Adversarial Examples Authors: Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik | Published: 2020-05-08 | Updated: 2020-10-08 2020.05.08 2025.05.13 Literature Database
Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01 2020.05.08 2025.05.13 Literature Database
A Review of Computer Vision Methods in Network Security Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne | Published: 2020-05-07 2020.05.07 2025.05.13 Literature Database