Literature Database

Spoofing Generalization: When Can’t You Trust Proprietary Models?

Authors: Ankur Moitra, Elchanan Mossel, Colin Sandon | Published: 2021-06-15 | Updated: 2022-03-23
Security Assurance
Signature Scheme Attack
Computational Complexity

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23
Dataset evaluation
Model Design and Accuracy
Taxonomy of Attacks

PopSkipJump: Decision-Based Attack for Probabilistic Classifiers

Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms
Defense Mechanism

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Authors: Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No | Published: 2021-06-14
Differential Privacy
Performance Evaluation
Encryption Technology

Stochastic Alternating Direction Method of Multipliers for Byzantine-Robust Distributed Learning

Authors: Feng Lin, Weiyu Li, Qing Ling | Published: 2021-06-13
Efficiency of Distributed Learning
Convergence analysis
Selection and Evaluation of Optimization Algorithms

Verifying Quantized Neural Networks using SMT-Based Model Checking

Authors: Luiz Sena, Xidan Song, Erickson Alves, Iury Bessa, Edoardo Manino, Lucas Cordeiro, Eddie de Lima Filho | Published: 2021-06-10 | Updated: 2021-09-16
Model Design and Accuracy
Safety Characteristics
Quantized Neural Network

AI-enabled Automation for Completeness Checking of Privacy Policies

Authors: Orlando Amaral, Sallam Abualhaija, Damiano Torre, Mehrdad Sabetzadeh, Lionel C. Briand | Published: 2021-06-10 | Updated: 2021-10-05
Privacy Enhancing Technology
Membership Inference
Legal Compliance

Bayesian Attention Belief Networks

Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09
Natural Language Processing
Computational Efficiency
Evaluation Method

Adaptive Machine Unlearning

Authors: Varun Gupta, Christopher Jung, Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi, Chris Waites | Published: 2021-06-08
Data Deletion Algorithm
Privacy Enhancing Technology
Privacy Protection in Machine Learning

Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization

Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08
Reinforcement Learning
Optimization Methods
Machine Learning