Literature Database

Improving Adversarial Robustness via Unlabeled Out-of-Domain Data

Authors: Zhun Deng, Linjun Zhang, Amirata Ghorbani, James Zou | Published: 2020-06-15 | Updated: 2021-02-21
Semi-Supervised Learning
Adversarial Learning
Statistical Methods

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24
Performance Evaluation
Deep Learning Method
Vulnerability detection

GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators

Authors: Dingfan Chen, Tribhuvanesh Orekondy, Mario Fritz | Published: 2020-06-15 | Updated: 2021-03-15
Algorithm Design
Performance Evaluation
Privacy Protection in Machine Learning

Robust Federated Recommendation System

Authors: Chen Chen, Jingfeng Zhang, Anthony K. H. Tung, Mohan Kankanhalli, Gang Chen | Published: 2020-06-15
Algorithm Design
Poisoning
Watermarking Technology

Privacy-Preserving Technology to Help Millions of People: Federated Prediction Model for Stroke Prevention

Authors: Ce Ju, Ruihui Zhao, Jichao Sun, Xiguang Wei, Bo Zhao, Yang Liu, Hongshan Li, Tianjian Chen, Xinwei Zhang, Dashan Gao, Ben Tan, Han Yu, Chuning He, Yuan Jin | Published: 2020-06-15 | Updated: 2020-12-15
Privacy Design Principles
Performance Evaluation
Privacy Protection in Machine Learning

Self-supervised Learning: Generative or Contrastive

Authors: Xiao Liu, Fanjin Zhang, Zhenyu Hou, Zhaoyu Wang, Li Mian, Jing Zhang, Jie Tang | Published: 2020-06-15 | Updated: 2021-03-20
Task Adaptation Method
Deep Learning Method
Self-Supervised Learning

Robust Variational Autoencoder for Tabular Data with Beta Divergence

Authors: Haleh Akrami, Sergul Aydore, Richard M. Leahy, Anand A. Joshi | Published: 2020-06-15 | Updated: 2020-06-16
Algorithm Design
Machine Learning Application
Deep Learning Method

GNNGuard: Defending Graph Neural Networks against Adversarial Attacks

Authors: Xiang Zhang, Marinka Zitnik | Published: 2020-06-15 | Updated: 2020-10-28
Graph Neural Network
Adversarial attack
Content Specialized for Toxicity Attacks

Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks

Authors: Keval Doshi, Yasin Yilmaz, Suleyman Uludag | Published: 2020-06-15
DDoS Attack
IoT Security
Intrusion Detection System

Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural Networks

Authors: Sarada Krithivasan, Sanchari Sen, Anand Raghunathan | Published: 2020-06-14 | Updated: 2020-09-14
Sparsity Optimization
Adversarial Example
Adversarial attack