Literature Database

Secure Federated Submodel Learning

Authors: Chaoyue Niu, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv, Zhihua Wu, Guihai Chen | Published: 2019-11-06 | Updated: 2019-11-11
Client Selection Method
Privacy Assurance
Privacy Management

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21
Poisoning
Attack Method
Adversarial Example

Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks

Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04
Model Performance Evaluation
Numerical Stability Issues
Role of Machine Learning

Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors

Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06
Attack Method
Adversarial Example
Image Processing

Privacy for Free: Communication-Efficient Learning with Differential Privacy Using Sketches

Authors: Tian Li, Zaoxing Liu, Vyas Sekar, Virginia Smith | Published: 2019-11-03 | Updated: 2019-12-06
Privacy Assurance
Privacy Management
Communication Efficiency

Online Robustness Training for Deep Reinforcement Learning

Authors: Marc Fischer, Matthew Mirman, Steven Stalder, Martin Vechev | Published: 2019-11-03 | Updated: 2019-11-22
Poisoning
Improvement of Learning
Knowledge Distillation

MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks

Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12
Attack Method
Adversarial Example
Effectiveness Analysis of Defense Methods

Automatic Detection of Generated Text is Easiest when Humans are Fooled

Authors: Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, Douglas Eck | Published: 2019-11-02 | Updated: 2020-05-07
Identification of AI Output
Text Perturbation Method
Deep Learning Method

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks

Authors: Ayoub Mars, Ahmad Abadleh, Wael Adi | Published: 2019-11-01
Secure Communication Channel
Privacy Management
Biometric Key Generation

Privacy-Preserving Machine Learning Using EtC Images

Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01
Privacy Management
Dimensionality Reduction Method
Intellectual Property Protection