Literature Database

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification

Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03
Watermarking
Data-Driven Vulnerability Assessment
Trust Evaluation Module

Certifiably Robust Variational Autoencoders

Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23
Watermarking
Data Generation
Model Architecture

Perceptually Constrained Adversarial Attacks

Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14
Watermarking
Attack Method
Adversarial Training

Private Prediction Sets

Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03
Watermarking
Data Protection Method
Difficulty Calibration

Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons

Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14
Dataset evaluation
Model Performance Evaluation
Adversarial Example

CaPC Learning: Confidential and Private Collaborative Learning

Authors: Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2021-02-09 | Updated: 2021-03-19
Active Learning
Data Protection Method
Encryption Technology

“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models

Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09
Poisoning
Model Performance Evaluation
Attack Method

$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers

Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22
Dataset evaluation
Data Protection Method
Model Performance Evaluation

Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack

Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01
Watermarking
Data Protection Method
Model Performance Evaluation

Efficient Certified Defenses Against Patch Attacks on Image Classifiers

Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08
Watermarking
Model Architecture
Adversarial Training