Literature Database

Towards Understanding the Dynamics of the First-Order Adversaries

Authors: Zhun Deng, Hangfeng He, Jiaoyang Huang, Weijie J. Su | Published: 2020-10-20
Adversarial Learning
Optimization Methods
Weight Update Method

Mitigating Sybil Attacks on Differential Privacy based Federated Learning

Authors: Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng | Published: 2020-10-20
Attack Methods against DFL
Poisoning
Poisoning Attack

Tight Second-Order Certificates for Randomized Smoothing

Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15
Optimization Methods
Feature Importance Analysis
Certificate Ratio Analysis

Image Obfuscation for Privacy-Preserving Machine Learning

Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20
Dataset evaluation
Data Protection Method
Membership Inference

A Survey of Machine Learning Techniques in Adversarial Image Forensics

Authors: Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo | Published: 2020-10-19
Poisoning
Adversarial Learning
Adversarial Example

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Authors: Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck | Published: 2020-10-19
PE Malware Classification
Backdoor Attack
Malware Classification

Dos and Don’ts of Machine Learning in Computer Security

Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30
Spurious Correlation
Dataset evaluation
Bias

Privacy-preserving Data Sharing on Vertically Partitioned Data

Authors: Razane Tajeddine, Joonas Jälkö, Samuel Kaski, Antti Honkela | Published: 2020-10-19 | Updated: 2022-09-02
Numerical Stability Issues
Optimization Methods
Privacy Protection in Machine Learning

Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders

Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02
Attack Method
Machine Learning
Financial Intelligence

Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization

Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26
DP-SGD
Performance Evaluation
Optimization Methods