Literature Database

Encrypted Distributed Lasso for Sparse Data Predictive Control

Authors: Andreea B. Alexandru, Anastasios Tsiamis, George J. Pappas | Published: 2021-04-23
Privacy Protection
Encryption Technology
Optimization Problem

Random Noise Defense Against Query-Based Black-Box Attacks

Authors: Zeyu Qin, Yanbo Fan, Hongyuan Zha, Baoyuan Wu | Published: 2021-04-23 | Updated: 2021-10-30
Convergence Analysis
Adversarial Example Detection
Defense Mechanism

Decentralized Federated Averaging

Authors: Tao Sun, Dongsheng Li, Bao Wang | Published: 2021-04-23
Convergence Analysis
Optimization Problem
Communication Analysis

SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics

Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22
Backdoor Attack
Poisoning
Poisoning Attack

Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions

Authors: Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li | Published: 2021-04-22
Performance Evaluation
Adversarial Example Detection
Untargeted Toxicity Attack

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU

Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22
Privacy Protection
Model Design
Encryption Technology

Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities

Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22
Multi-Class Classification
Model Design
Feature Engineering

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Authors: Vance Wong, John Emanuello | Published: 2021-04-21
ML-Based IDS
Feature Engineering
Threat Model

Dataset Inference: Ownership Resolution in Machine Learning

Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21
Data Privacy Assessment
Intellectual Property Protection
Statistical Hypothesis Testing

Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13
UAP Training Method
Adversarial Example Detection
Defense Mechanism