Literature Database

Analyzing Bias in Sensitive Personal Information Used to Train Financial Models

Authors: Reginald Bryant, Celia Cintas, Isaac Wambugu, Andrew Kinai, Komminist Weldemariam | Published: 2019-11-09
Data Generation Method
Privacy Risk Management
Legal Compliance

AutoIDS: Auto-encoder Based Method for Intrusion Detection System

Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08
Security Metric
Attack Detection
Fundamentals of Machine Learning

Imperceptible Adversarial Attacks on Tabular Data

Authors: Vincent Ballet, Xavier Renard, Jonathan Aigrain, Thibault Laugel, Pascal Frossard, Marcin Detyniecki | Published: 2019-11-08 | Updated: 2019-12-13
Vulnerability of Tabular Data
Adversarial Example
Adversarial attack

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08
Privacy Protection
Efficiency Evaluation
Performance Evaluation

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
Model Performance Evaluation
Adversarial Attack Methods
Feature Engineering

Certified Data Removal from Machine Learning Models

Authors: Chuan Guo, Tom Goldstein, Awni Hannun, Laurens van der Maaten | Published: 2019-11-08 | Updated: 2023-11-08
Data Deletion Algorithm
Privacy Assessment
Machine learning

An automated approach for task evaluation using EEG signals

Authors: Vishal Anand, S. R. Sreeja, Debasis Samanta | Published: 2019-11-07 | Updated: 2019-11-14
Task Design
Signal Processing
Machine Learning

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
Model Performance Evaluation
Adversarial Attack Methods
Knowledge Transferability

Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods

Authors: Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, Himabindu Lakkaraju | Published: 2019-11-06 | Updated: 2020-02-03
XAI (Explainable AI)
Adversarial Learning
Attacks on Explainability

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06
Process Partitioning Method
Attack Type
Attack Detection