Secure Federated Submodel Learning Authors: Chaoyue Niu, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv, Zhihua Wu, Guihai Chen | Published: 2019-11-06 | Updated: 2019-11-11 Client Selection MethodPrivacy AssurancePrivacy Management 2019.11.06 2025.05.28 Literature Database
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21 PoisoningAttack MethodAdversarial Example 2019.11.05 2025.05.28 Literature Database
Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04 Model Performance EvaluationNumerical Stability IssuesRole of Machine Learning 2019.11.04 2025.05.28 Literature Database
Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06 Attack MethodAdversarial ExampleImage Processing 2019.11.04 2025.05.28 Literature Database
Privacy for Free: Communication-Efficient Learning with Differential Privacy Using Sketches Authors: Tian Li, Zaoxing Liu, Vyas Sekar, Virginia Smith | Published: 2019-11-03 | Updated: 2019-12-06 Privacy AssurancePrivacy ManagementCommunication Efficiency 2019.11.03 2025.05.28 Literature Database
Online Robustness Training for Deep Reinforcement Learning Authors: Marc Fischer, Matthew Mirman, Steven Stalder, Martin Vechev | Published: 2019-11-03 | Updated: 2019-11-22 PoisoningImprovement of LearningKnowledge Distillation 2019.11.03 2025.05.28 Literature Database
MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12 Attack MethodAdversarial ExampleEffectiveness Analysis of Defense Methods 2019.11.03 2025.05.28 Literature Database
Automatic Detection of Generated Text is Easiest when Humans are Fooled Authors: Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, Douglas Eck | Published: 2019-11-02 | Updated: 2020-05-07 Identification of AI OutputText Perturbation MethodDeep Learning Method 2019.11.02 2025.05.28 Literature Database
Operator and Manufacturer Independent D2D Private Link for Future 5G Networks Authors: Ayoub Mars, Ahmad Abadleh, Wael Adi | Published: 2019-11-01 Secure Communication ChannelPrivacy ManagementBiometric Key Generation 2019.11.01 2025.05.28 Literature Database
Privacy-Preserving Machine Learning Using EtC Images Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01 Privacy ManagementDimensionality Reduction MethodIntellectual Property Protection 2019.11.01 2025.05.28 Literature Database