Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03 WatermarkingData-Driven Vulnerability AssessmentTrust Evaluation Module 2021.02.15 2025.05.28 Literature Database
Certifiably Robust Variational Autoencoders Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23 WatermarkingData GenerationModel Architecture 2021.02.15 2025.05.28 Literature Database
Perceptually Constrained Adversarial Attacks Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14 WatermarkingAttack MethodAdversarial Training 2021.02.14 2025.05.28 Literature Database
Private Prediction Sets Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03 WatermarkingData Protection MethodDifficulty Calibration 2021.02.11 2025.05.28 Literature Database
Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14 Dataset evaluationModel Performance EvaluationAdversarial Example 2021.02.10 2025.05.28 Literature Database
CaPC Learning: Confidential and Private Collaborative Learning Authors: Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2021-02-09 | Updated: 2021-03-19 Active LearningData Protection MethodEncryption Technology 2021.02.09 2025.05.28 Literature Database
“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09 PoisoningModel Performance EvaluationAttack Method 2021.02.09 2025.05.28 Literature Database
$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22 Dataset evaluationData Protection MethodModel Performance Evaluation 2021.02.09 2025.05.28 Literature Database
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.08 2025.05.28 Literature Database
Efficient Certified Defenses Against Patch Attacks on Image Classifiers Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08 WatermarkingModel ArchitectureAdversarial Training 2021.02.08 2025.05.28 Literature Database