Literature Database

Certifiably Robust Interpretation via Renyi Differential Privacy

Authors: Ao Liu, Xiaoyu Chen, Sijia Liu, Lirong Xia, Chuang Gan | Published: 2021-07-04
Privacy Analysis
Robustness
Computational Efficiency

Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02
Dataset evaluation
Model Performance Evaluation
Attack Evaluation

Segmented Federated Learning for Adaptive Intrusion Detection System

Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02
Cybersecurity
Machine Learning Method
Federated Learning

Robust and Fully-Dynamic Coreset for Continuous-and-Bounded Learning (With Outliers) Problems

Authors: Zixiu Wang, Yiwen Guo, Hu Ding | Published: 2021-06-30 | Updated: 2022-01-21
Core Set Construction
Robustness
Machine Learning Method

Robust Distributed Optimization With Randomly Corrupted Gradients

Authors: Berkay Turan, Cesar A. Uribe, Hoi-To Wai, Mahnoosh Alizadeh | Published: 2021-06-28 | Updated: 2022-06-17
Markov Model
Robust Regression
Optimization Methods

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis

Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16
Feature Extraction Method
Anomaly Detection Method
Communication Analysis

Poisoning the Search Space in Neural Architecture Search

Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28
Data-Driven Vulnerability Assessment
Efficiency Evaluation
Machine Learning Algorithm

On the (Un-)Avoidability of Adversarial Examples

Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24
Robustness Evaluation
Adversarial Example
Machine Learning Algorithm

Teacher Model Fingerprinting Attacks Against Transfer Learning

Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23
Watermarking
Data Collection
Prompt Injection

Machine learning for risk assessment in gender-based crime

Authors: Ángel González-Prieto, Antonio Brú, Juan Carlos Nuño, José Luis González-Álvarez | Published: 2021-06-22
Recidivism Prediction Model
Machine Learning Algorithm
Police Protection Assessment