Literature Database

How Does Mixup Help With Robustness and Generalization?

Authors: Linjun Zhang, Zhun Deng, Kenji Kawaguchi, Amirata Ghorbani, James Zou | Published: 2020-10-09 | Updated: 2021-03-17
Poisoning
Robustness Evaluation
Generalization Performance

Anomaly detection with superexperts under delayed feedback

Authors: Raisa Dzhamtyrova, Carsten Maple | Published: 2020-10-08 | Updated: 2021-04-22
Game Theory
Generalization Performance
Weight Update Method

Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

Authors: Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2020-10-08 | Updated: 2024-01-08
Multi-Class Classification
Model Performance Evaluation
Concept Drift

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07
Smart Healthcare
Adversarial Example
Adversarial Attack Methods

Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples

Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30
Poisoning
Robustness Improvement Method
Adversarial attack

CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails

Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07
Model Architecture
Improvement of Learning
Machine Learning

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02
Membership Inference
Adversarial attack
Machine Learning

Correlated Differential Privacy: Feature Selection in Machine Learning

Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07
Data Protection Method
Data Selection Strategy
Feature Importance Analysis

BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models

Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08
Dataset evaluation
Backdoor Attack
Machine Learning

InstaHide: Instance-hiding Schemes for Private Distributed Learning

Authors: Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora | Published: 2020-10-06 | Updated: 2021-02-24
Attack Type
Encryption Method
Encryption Technology