Learning to Learn by Zeroth-Order Oracle Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07 Performance EvaluationLoss TermSelection and Evaluation of Optimization Algorithms 2019.10.21 2025.05.28 Literature Database
Aleatoric and Epistemic Uncertainty in Machine Learning: An Introduction to Concepts and Methods Authors: Eyke Hüllermeier, Willem Waegeman | Published: 2019-10-21 | Updated: 2020-09-16 Quantification of UncertaintyHandling of UncertaintyStatistical Hypothesis Testing 2019.10.21 2025.05.28 Literature Database
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28 Network Traffic AnalysisPerformance EvaluationMachine Learning Method 2019.10.21 2025.05.28 Literature Database
Recovering Localized Adversarial Attacks Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21 PoisoningAdversarial LearningFeature Importance Analysis 2019.10.21 2025.05.28 Literature Database
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text Authors: Oluwaseyi Feyisetan, Tom Diethe, Thomas Drake | Published: 2019-10-20 Privacy Protection MethodPrivacy IssuesMembership Inference 2019.10.20 2025.05.28 Literature Database
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05 Cyber ThreatModel EnsembleFeature Importance Analysis 2019.10.18 2025.05.28 Literature Database
A Fast Saddle-Point Dynamical System Approach to Robust Deep Learning Authors: Yasaman Esfandiari, Aditya Balu, Keivan Ebrahimi, Umesh Vaidya, Nicola Elia, Soumik Sarkar | Published: 2019-10-18 | Updated: 2021-03-01 Model RobustnessAdversarial LearningAdversarial Example 2019.10.18 2025.05.28 Literature Database
Federated Generative Privacy Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-10-18 Privacy Protection MethodPrivacy AssessmentGenerative Model 2019.10.18 2025.05.28 Literature Database
Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation Authors: Anindya Sarkar, Nikhil Kumar Gupta, Raghu Iyengar | Published: 2019-10-17 | Updated: 2019-10-21 PoisoningAdversarial LearningAdversarial Example 2019.10.17 2025.05.28 Literature Database
Mapper Based Classifier Authors: Jacek Cyranka, Alexander Georges, David Meyer | Published: 2019-10-17 | Updated: 2019-10-21 Model RobustnessDeep LearningGenerative Model 2019.10.17 2025.05.28 Literature Database