Literature Database

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
Impact of Generalization
Performance Evaluation
Adversarial Example

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
Algorithm Design
Adversarial Example
Adversarial Attack Detection

I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences

Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06
Poisoning
Membership Inference
Adversarial Attack Methods

Deepfake histological images for enhancing digital pathology

Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16
Algorithm
Threats of Medical AI
Performance Evaluation

On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits

Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16
Algorithm
Online Decision Making
Performance Evaluation

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
Security Analysis
Data Selection Strategy
Classification Pattern Analysis

BlindFL: Vertical Federated Machine Learning without Peeking into Your Data

Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui | Published: 2022-06-16
Algorithm
Privacy Enhancing Protocol
Multi-Party Computation

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
Adversarial Learning
Adversarial attack
Threat Model

HyperImpute: Generalized Iterative Imputation with Automatic Model Selection

Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15
Algorithm
Hyperparameter Tuning
Performance Evaluation Metrics

Reconstructing Training Data from Trained Neural Networks

Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05
Hyperparameter Tuning
Performance Evaluation Metrics
Adversarial Learning