Literature Database

Revisiting Ensembles in an Adversarial Context: Improving Natural Accuracy

Authors: Aditya Saligrama, Guillaume Leclerc | Published: 2020-02-26
Robustness Evaluation
Performance Evaluation
Adversarial Training

IoT Device Identification Using Deep Learning

Authors: Jaidip Kotak, Yuval Elovici | Published: 2020-02-25
Data Management System
Performance Evaluation
Machine Learning Method

Gödel’s Sentence Is An Adversarial Example But Unsolvable

Authors: Xiaodong Qi, Lansheng Han | Published: 2020-02-25
Adversarial Example
Adversarial Training
Vulnerability Prediction

Towards Backdoor Attacks and Defense in Robust Machine Learning Models

Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11
Backdoor Attack
Poisoning
Robustness Evaluation

Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space

Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25
Robustness Evaluation
Adversarial Learning
Defense Method

HYDRA: Pruning Adversarially Robust Neural Networks

Authors: Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana | Published: 2020-02-24 | Updated: 2020-11-10
Robustness Evaluation
Adversarial Training
Optimization Problem

Approximate Data Deletion from Machine Learning Models

Authors: Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, James Zou | Published: 2020-02-24 | Updated: 2021-02-23
Machine learning
Model Evaluation
Robustness Evaluation

Stealing Black-Box Functionality Using The Deep Neural Tree Architecture

Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23
Training Data Extraction Method
Training Method
Machine Learning Method

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning

Authors: Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu | Published: 2020-02-23 | Updated: 2021-08-15
Privacy Protection Mechanism
Federated Learning
Defense Method

Neuron Shapley: Discovering the Responsible Neurons

Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13
Performance Evaluation
Feature Importance Analysis
Vulnerability Prediction