Literature Database

Identifying Statistical Bias in Dataset Replication

Authors: Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Jacob Steinhardt, Aleksander Madry | Published: 2020-05-19 | Updated: 2020-09-02
Data Curation
Data Generation Method
Bias Elimination in Training Data

Continuous LWE

Authors: Joan Bruna, Oded Regev, Min Jae Song, Yi Tang | Published: 2020-05-19 | Updated: 2020-10-24
Algorithm
Computational Problem
Quantum Information and Quantum Computing

Scalable Privacy-Preserving Distributed Learning

Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux | Published: 2020-05-19 | Updated: 2021-07-14
Privacy Assessment
Multi-Party Computation
Cryptographic Protocol

Enhancing Certified Robustness via Smoothed Weighted Ensembling

Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23
Algorithm
Generalization Performance
Research Methodology

Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models

Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan | Published: 2020-05-19
Attack Evaluation
Adversarial Example
Vulnerability of Adversarial Examples

FrameProv: Towards End-To-End Video Provenance

Authors: Mansoor Ahmed-Rengers | Published: 2020-05-19
System Requirements
Privacy Assessment
Video Reliability Assurance

On Intrinsic Dataset Properties for Adversarial Machine Learning

Authors: Jeffrey Z. Pan, Nicholas Zufelt | Published: 2020-05-19
Poisoning
Performance Evaluation Metrics
Machine Learning Method

BLAZE: Blazing Fast Privacy-Preserving Machine Learning

Authors: Arpita Patra, Ajith Suresh | Published: 2020-05-18
MPC Algorithm
Machine Learning Algorithm
Computational Efficiency

An Overview of Privacy in Machine Learning

Authors: Emiliano De Cristofaro | Published: 2020-05-18
Privacy Technique
Membership Inference
Machine Learning Method

Universalization of any adversarial attack using very few test examples

Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian | Published: 2020-05-18 | Updated: 2022-10-28
Performance Evaluation Metrics
Adversarial Example
Deep Learning Technology