Literature Database

Robust Upper Bounds for Adversarial Training

Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06
Robust Regression
Adversarial Training
Deep Learning Method

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives

Authors: Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi | Published: 2021-12-16
Adversarial Example
Adversarial Training
Machine Learning Application

Model Stealing Attacks Against Inductive Graph Neural Networks

Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15
Graph Representation Learning
Adversarial Training
Machine Learning Method

Few-shot Instruction Prompts for Pretrained Language Models to Detect Social Biases

Authors: Shrimai Prabhumoye, Rafal Kocielnik, Mohammad Shoeybi, Anima Anandkumar, Bryan Catanzaro | Published: 2021-12-15 | Updated: 2022-04-15
Bias Detection in AI Output
Few-Shot Learning
Large Language Model

HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing

Authors: Xiao Han, Yuncong Yang, Junjie Wu | Published: 2021-12-15
Algorithm Design
Data Obfuscation
Privacy Risk Management

Robustifying automatic speech recognition by extracting slowly varying features

Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06
Poisoning
Adversarial Training
Defense Method

Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14
Data Collection
Model Design
Machine Learning Method

MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction

Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14
Link Prediction Method
Performance Evaluation Metrics
Machine Learning Method

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors

Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13
Privacy Violation
Protocol Performance Evaluation
Communication Efficiency

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14
Algorithm Design
Memory Management Method
Communication Efficiency