Literature Database

Outlier Detection and Spatial Analysis Algorithms

Authors: Jacob John | Published: 2021-06-20
Data Preprocessing
Data Collection
Data-Driven Clustering

Residual Error: a New Performance Measure for Adversarial Robustness

Authors: Hossein Aboutalebi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger, Alexander Wong | Published: 2021-06-18
Model Design and Accuracy
Classification Pattern Analysis
Machine Learning Application

Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning

Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07
Poisoning
Federated Learning
Adaptive Adversarial Training

Longitudinal Compliance Analysis of Android Applications with Privacy Policies

Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28
Data Collection
Data Leakage
Privacy Enhancing Technology

Accumulative Poisoning Attacks on Real-time Data

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26
Online Learning
Backdoor Attack
Federated Learning

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11
Adversarial Example
Optimization Strategy
Defense Mechanism

Bad Characters: Imperceptible NLP Attacks

Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11
Cyber Attack
Prompt Injection
Machine Learning Application

Localized Uncertainty Attacks

Authors: Ousmane Amadou Dia, Theofanis Karaletsos, Caner Hazirbas, Cristian Canton Ferrer, Ilknur Kaynar Kabul, Erik Meijer | Published: 2021-06-17
Cyber Attack
Uncertainty Estimation
Adversarial Example

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
Backdoor Attack
Poisoning
Machine Learning

Optimal Accounting of Differential Privacy via Characteristic Function

Authors: Yuqing Zhu, Jinshuo Dong, Yu-Xiang Wang | Published: 2021-06-16 | Updated: 2022-05-31
Privacy Enhancing Technology
Convergence analysis
Optimization Problem