Literature Database

ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15
Dataset Generation
Robustness Evaluation
Optimization Strategy

Vulnerability Detection in Open Source Software: An Introduction

Authors: Stuart Millar | Published: 2022-03-06
Dynamic Analysis
Vulnerability detection
Static Analysis

Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05
Graph Representation Learning
Data Generation
Framework

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18
Dataset Generation
Data Generation
Model Performance Evaluation

Training language models to follow instructions with human feedback

Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04
Alignment
User Behavior Analysis
Performance Evaluation

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12
Malware Classification
Adversarial Example
Defense Method

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04
Backdoor Attack
Model Architecture

Differentially Private Label Protection in Split Learning

Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04
Trade-off Analysis
Privacy Enhancing Technology
Label

Why adversarial training can hurt robust accuracy

Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03
Dataset Generation
Robustness
Adversarial Example

Label Leakage and Protection from Forward Embedding in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25
Trade-off Analysis
Poisoning
Label