Real-Time Edge Intelligence in the Making: A Collaborative Learning Framework via Federated Meta-Learning Authors: Sen Lin, Guang Yang, Junshan Zhang | Published: 2020-01-09 | Updated: 2020-05-08 Convergence AnalysisMachine LearningCommunication Efficiency 2020.01.09 2025.05.28 Literature Database
Secure multiparty computations in floating-point arithmetic Authors: Chuan Guo, Awni Hannun, Brian Knott, Laurens van der Maaten, Mark Tygert, Ruiyu Zhu | Published: 2020-01-09 Polynomial ApproximationMachine LearningLinear Model 2020.01.09 2025.05.28 Literature Database
Explainable Deep Convolutional Candlestick Learner Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29 Candlestick PatternAdversarial Perturbation TechniquesMachine Learning Application 2020.01.08 2025.05.28 Literature Database
To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08 Prompt InjectionMembership InferenceAdversarial Learning 2020.01.08 2025.05.28 Literature Database
MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14 Robustness EvaluationOptimization MethodsDeep Learning 2020.01.08 2025.05.28 Literature Database
Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07 Clustering methodsRobustness EvaluationAdversarial Learning 2020.01.07 2025.05.28 Literature Database
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07 Robustness EvaluationMalicious ClientAdversarial Learning 2020.01.07 2025.05.28 Literature Database
Towards a secure behavior modeling for IoT networks using Blockchain Authors: Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed | Published: 2020-01-06 IoT SecurityTrusted Capable Model EnvironmentsDeep Learning 2020.01.06 2025.05.28 Literature Database
Generating Semantic Adversarial Examples via Feature Manipulation Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20 Data GenerationAdversarial ExampleAdversarial Learning 2020.01.06 2025.05.28 Literature Database
Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18 Adversarial LearningOptimization MethodsStatistical Methods 2020.01.02 2025.05.28 Literature Database