Perturbing Inputs to Prevent Model Stealing Authors: Justin Grana | Published: 2020-05-12 2020.05.12 2025.05.28 Literature Database
A Secure Federated Learning Framework for 5G Networks Authors: Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif | Published: 2020-05-12 2020.05.12 2025.05.28 Literature Database
Evaluating Ensemble Robustness Against Adversarial Attacks Authors: George Adam, Romain Speciel | Published: 2020-05-12 2020.05.12 2025.05.28 Literature Database
Robustness Verification for Classifier Ensembles Authors: Dennis Gross, Nils Jansen, Guillermo A. Pérez, Stephan Raaijmakers | Published: 2020-05-12 | Updated: 2020-07-09 2020.05.12 2025.05.28 Literature Database
Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18 2020.05.12 2025.05.28 Literature Database
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 2020.05.11 2025.05.28 Literature Database
Provable Robust Classification via Learned Smoothed Densities Authors: Saeed Saremi, Rupesh Srivastava | Published: 2020-05-09 2020.05.09 2025.05.28 Literature Database
Estimating g-Leakage via Machine Learning Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24 2020.05.09 2025.05.28 Literature Database
Cloud-based Federated Boosting for Mobile Crowdsensing Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09 2020.05.09 2025.05.28 Literature Database
Towards Robustness against Unsuspicious Adversarial Examples Authors: Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik | Published: 2020-05-08 | Updated: 2020-10-08 2020.05.08 2025.05.28 Literature Database