Literature Database

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service

Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16
Blockchain
Machine Learning Method
Computational Problem

Node Injection Attacks on Graphs via Reinforcement Learning

Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14
Node Injection Attack
Poisoning
Reinforcement Learning Algorithm

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13
Security Analysis
Performance Evaluation
Adversarial Learning

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13
Performance Evaluation
Adversarial Example
Adversarial Learning

On the Hardness of Robust Classification

Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2019-09-12
Learnability of Monotone Combinations
Loss Function
Computational Problem

Machine Learning in/for Blockchain: Future and Challenges

Authors: Fang Chen, Hong Wan, Hua Cai, Guang Cheng | Published: 2019-09-12 | Updated: 2020-12-08
Blockchain Technology
Reinforcement Learning
Role of Machine Learning

An Empirical Investigation of Randomized Defenses against Adversarial Attacks

Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12
Security Analysis
Adversarial Example
Machine Learning Technology

Inspecting adversarial examples using the Fisher information

Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12
Fisher Information Sensitivity
Attack Detection
Adversarial Example

Feedback Learning for Improving the Robustness of Neural Networks

Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12
Class Imbalance
Attack Method
Adversarial Example

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12
Sensor State Estimation
Attack Method
Machine Learning Application