Literature Database

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19
Data Extraction and Analysis
Poisoning
Adversarial Attack Methods

LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack

Authors: Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Mubarak Shah, Ajmal Mian | Published: 2021-03-19 | Updated: 2021-03-22
Adversarial Attack Methods
Optimization Problem
Deep Learning Technology

An Experiment Study on Federated LearningTestbed

Authors: Cheng Shen, Wanli Xue | Published: 2021-03-19
Privacy Risk Management
Model Communication
Communication Efficiency

Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning

Authors: Srivalli Boddupalli, Akash Someshwar Rao, Sandip Ray | Published: 2021-03-18
Attack Detection
Adversarial Attack Methods
Role of Machine Learning

Towards Few-Shot Fact-Checking via Perplexity

Authors: Nayeon Lee, Yejin Bang, Andrea Madotto, Madian Khabsa, Pascale Fung | Published: 2021-03-17
Few-Shot Learning
Prompt validation
Detection of Misinformation

The Influence of Dropout on Membership Inference in Differentially Private Models

Authors: Erick Galinkin | Published: 2021-03-16
Data Management System
Model Architecture
Quantification of Uncertainty

DDUO: General-Purpose Dynamic Analysis for Differential Privacy

Authors: Chike Abuah, Alex Silence, David Darais, Joe Near | Published: 2021-03-16
Data Dependency
Privacy Risk Management
Dynamic Analysis

Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory

Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15
Performance Evaluation
Risk Assessment Method
Deep Learning Technology

Quantum federated learning through blind quantum computing

Authors: Weikang Li, Sirui Lu, Dong-Ling Deng | Published: 2021-03-15 | Updated: 2021-09-02
Privacy Risk Management
Poisoning
Quantum Classifier

Simeon — Secure Federated Machine Learning Through Iterative Filtering

Authors: Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino | Published: 2021-03-13
Backdoor Attack Techniques
Byzantine Consensus Mechanism
Adversarial Attack Methods