Literature Database

Accurate, reliable and fast robustness evaluation

Authors: Wieland Brendel, Jonas Rauber, Matthias Kümmerer, Ivan Ustyuzhaninov, Matthias Bethge | Published: 2019-07-01 | Updated: 2019-12-12
Adversarial attack
Optimization Strategy
Deep Learning Method

Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network”

Authors: Roland S. Zimmermann | Published: 2019-07-01
Poisoning
Adversarial attack
Deep Learning Method

System Misuse Detection via Informed Behavior Clustering and Modeling

Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01
Data Extraction and Analysis
Machine Learning Framework
Anomaly Detection Method

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28
Security Testing
Machine Learning Framework
Research Methodology

On the Privacy Risks of Model Explanations

Authors: Reza Shokri, Martin Strobel, Yair Zick | Published: 2019-06-29 | Updated: 2021-02-05
Membership Inference
Adversarial attack
Explanation Method

DP-LSSGD: A Stochastic Optimization Method to Lift the Utility in Privacy-Preserving ERM

Authors: Bao Wang, Quanquan Gu, March Boedihardjo, Farzin Barekat, Stanley J. Osher | Published: 2019-06-28 | Updated: 2019-12-07
Privacy Protection
Optimization Strategy
Machine Learning Framework

Secure Summation via Subset Sums: A New Primitive for Privacy-Preserving Distributed Machine Learning

Authors: Valentin Hartmann, Robert West | Published: 2019-06-27 | Updated: 2023-06-19
Data Extraction and Analysis
Privacy Protection
Initial Seed Generation

Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference

Authors: Klas Leino, Matt Fredrikson | Published: 2019-06-27 | Updated: 2020-06-24
Privacy Protection
Membership Inference
Adversarial attack

Adversarial Robustness via Label-Smoothing

Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15
Adversarial Example
Adversarial attack
Deep Learning Method

Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks

Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03
Certified Robustness
Detection of Model Extraction Attacks
Attack Evaluation