How Does Mixup Help With Robustness and Generalization? Authors: Linjun Zhang, Zhun Deng, Kenji Kawaguchi, Amirata Ghorbani, James Zou | Published: 2020-10-09 | Updated: 2021-03-17 PoisoningRobustness EvaluationGeneralization Performance 2020.10.09 2025.05.28 Literature Database
Anomaly detection with superexperts under delayed feedback Authors: Raisa Dzhamtyrova, Carsten Maple | Published: 2020-10-08 | Updated: 2021-04-22 Game TheoryGeneralization PerformanceWeight Update Method 2020.10.08 2025.05.28 Literature Database
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift Authors: Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2020-10-08 | Updated: 2024-01-08 Multi-Class ClassificationModel Performance EvaluationConcept Drift 2020.10.08 2025.05.28 Literature Database
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07 Smart HealthcareAdversarial ExampleAdversarial Attack Methods 2020.10.07 2025.05.28 Literature Database
Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30 PoisoningRobustness Improvement MethodAdversarial attack 2020.10.07 2025.05.28 Literature Database
CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07 Model ArchitectureImprovement of LearningMachine Learning 2020.10.07 2025.05.28 Literature Database
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02 Membership InferenceAdversarial attackMachine Learning 2020.10.07 2025.05.28 Literature Database
Correlated Differential Privacy: Feature Selection in Machine Learning Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07 Data Protection MethodData Selection StrategyFeature Importance Analysis 2020.10.07 2025.05.28 Literature Database
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08 Dataset evaluationBackdoor AttackMachine Learning 2020.10.06 2025.05.28 Literature Database
InstaHide: Instance-hiding Schemes for Private Distributed Learning Authors: Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora | Published: 2020-10-06 | Updated: 2021-02-24 Attack TypeEncryption MethodEncryption Technology 2020.10.06 2025.05.28 Literature Database