Literature Database

Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics

Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha | Published: 2020-09-11
Membership Inference
Membership Disclosure Risk
Adversarial Attack Methods

Machine Unlearning for Random Forests

Authors: Jonathan Brophy, Daniel Lowd | Published: 2020-09-11 | Updated: 2021-06-11
Data Deletion Algorithm
Machine learning
Performance Evaluation Metrics

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology

Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning

Authors: Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang | Published: 2020-09-10
Membership Inference
Membership Disclosure Risk
Deep Transfer Learning

Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20
Poisoning
Performance Evaluation
Adversarial Attack Methods

A black-box adversarial attack for poisoning clustering

Authors: Antonio Emanuele Cinà, Alessandro Torcinovich, Marcello Pelillo | Published: 2020-09-09 | Updated: 2021-11-10
Backdoor Attack
Poisoning
Content Specialized for Toxicity Attacks

SoK: Certified Robustness for Deep Neural Networks

Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12
Formal Verification
Deep Learning Technology
Vulnerability Assessment Method

Attribute Privacy: Framework and Mechanisms

Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11
Data Generation
Cryptography
Machine Learning Technology

Highly Accurate CNN Inference Using Approximate Activation Functions over Homomorphic Encryption

Authors: Takumi Ishiyama, Takuya Suzuki, Hayato Yamana | Published: 2020-09-08 | Updated: 2020-12-02
Levelled Homomorphic Encryption
Cryptography
Deep Learning Technology