Literature Database

Constraining Logits by Bounded Function for Adversarial Robustness

Authors: Sekitoshi Kanai, Masanori Yamada, Shin'ya Yamaguchi, Hiroshi Takahashi, Yasutoshi Ida | Published: 2020-10-06
Robustness Improvement Method
Improvement of Learning
Adversarial attack

PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning

Authors: Yuli Zheng, Zhenyu Wu, Ye Yuan, Tianlong Chen, Zhangyang Wang | Published: 2020-10-06
Data Protection Method
Machine Learning
Financial Intelligence

Downscaling Attack and Defense: Turning What You See Back Into What You Get

Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07
Attack Type
Adversarial attack
Image Processing

Metadata-Based Detection of Child Sexual Abuse Material

Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27
Dataset evaluation
Model Evaluation
Machine Learning

Goal-directed Generation of Discrete Structures with Conditional Generative Models

Authors: Amina Mollaysa, Brooks Paige, Alexandros Kalousis | Published: 2020-10-05 | Updated: 2020-10-23
Condition Monitoring
Deep Learning
Deep Reinforcement Learning

Adversarial Boot Camp: label free certified robustness in one epoch

Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05
Robustness Improvement Method
Improvement of Learning
Adversarial attack

Understanding Catastrophic Overfitting in Single-step Adversarial Training

Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15
Poisoning
Robustness Evaluation
Adversarial Learning

Lipschitz Bounded Equilibrium Networks

Authors: Max Revay, Ruigang Wang, Ian R. Manchester | Published: 2020-10-05
Robustness Evaluation
Deep Learning
Weight Update Method

A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games

Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13
Online Decision Making
Game Theory
Deep Learning

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04
DNS Covert Channel
Machine Learning Technology
Anomaly Detection Method