Literature Database

On the Effectiveness of Regularization Against Membership Inference Attacks

Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2020-06-09
Privacy Assessment
Improvement of Learning
Defense Effectiveness Analysis

Approximating Lipschitz continuous functions with GroupSort neural networks

Authors: Ugo Tanielian, Maxime Sangnier, Gerard Biau | Published: 2020-06-09 | Updated: 2021-02-08
Algorithm
Mesoscopic Linearity
Fundamentals of Machine Learning

Simultaneous Perturbation Stochastic Approximation for Few-Shot Learning

Authors: Andrei Boiarov, Oleg Granichin, Olga Granichina | Published: 2020-06-09
Few-Shot Learning
Algorithm
Improvement of Learning

Stealing Deep Reinforcement Learning Models for Fun and Profit

Authors: Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu | Published: 2020-06-09 | Updated: 2020-12-22
Algorithm
Improvement of Learning
Attack Type

Secure Byzantine-Robust Machine Learning

Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2020-06-08 | Updated: 2020-10-18
MPC Algorithm
Privacy Assessment
Federated Learning

Trade-offs between membership privacy & adversarially robust learning

Authors: Jamie Hayes | Published: 2020-06-08 | Updated: 2022-01-08
Membership Inference
Overfitting

Adversarial Feature Desensitization

Authors: Pouya Bashivan, Reza Bayat, Adam Ibrahim, Kartik Ahuja, Mojtaba Faramarzi, Touraj Laleh, Blake Aaron Richards, Irina Rish | Published: 2020-06-08 | Updated: 2022-01-04
Algorithm
Adversarial Example
Adversarial Example Detection

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08
Attack Method
Feature Engineering
Vulnerability detection

ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing

Authors: Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach | Published: 2020-06-08 | Updated: 2021-10-28
Algorithm
Privacy Assessment
Federated Learning System

Tricking Adversarial Attacks To Fail

Authors: Blerta Lindqvist | Published: 2020-06-08
Attack Type
Adversarial Attack Detection
Defense Effectiveness Analysis