Accurate, reliable and fast robustness evaluation Authors: Wieland Brendel, Jonas Rauber, Matthias Kümmerer, Ivan Ustyuzhaninov, Matthias Bethge | Published: 2019-07-01 | Updated: 2019-12-12 Adversarial attackOptimization StrategyDeep Learning Method 2019.07.01 2025.05.28 Literature Database
Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network” Authors: Roland S. Zimmermann | Published: 2019-07-01 PoisoningAdversarial attackDeep Learning Method 2019.07.01 2025.05.28 Literature Database
System Misuse Detection via Informed Behavior Clustering and Modeling Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01 Data Extraction and AnalysisMachine Learning FrameworkAnomaly Detection Method 2019.07.01 2025.05.28 Literature Database
Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28 Security TestingMachine Learning FrameworkResearch Methodology 2019.06.30 2025.05.28 Literature Database
On the Privacy Risks of Model Explanations Authors: Reza Shokri, Martin Strobel, Yair Zick | Published: 2019-06-29 | Updated: 2021-02-05 Membership InferenceAdversarial attackExplanation Method 2019.06.29 2025.05.28 Literature Database
DP-LSSGD: A Stochastic Optimization Method to Lift the Utility in Privacy-Preserving ERM Authors: Bao Wang, Quanquan Gu, March Boedihardjo, Farzin Barekat, Stanley J. Osher | Published: 2019-06-28 | Updated: 2019-12-07 Privacy ProtectionOptimization StrategyMachine Learning Framework 2019.06.28 2025.05.28 Literature Database
Secure Summation via Subset Sums: A New Primitive for Privacy-Preserving Distributed Machine Learning Authors: Valentin Hartmann, Robert West | Published: 2019-06-27 | Updated: 2023-06-19 Data Extraction and AnalysisPrivacy ProtectionInitial Seed Generation 2019.06.27 2025.05.28 Literature Database
Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference Authors: Klas Leino, Matt Fredrikson | Published: 2019-06-27 | Updated: 2020-06-24 Privacy ProtectionMembership InferenceAdversarial attack 2019.06.27 2025.05.28 Literature Database
Adversarial Robustness via Label-Smoothing Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15 Adversarial ExampleAdversarial attackDeep Learning Method 2019.06.27 2025.05.28 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database