Literature Database

FineFool: Fine Object Contour Attack via Attention

Authors: Jinyin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su | Published: 2018-12-01
Certified Robustness
Effective Perturbation Methods
Weight Update Method

Deep Learning Application in Security and Privacy — Theory and Practice: A Position Paper

Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis | Published: 2018-12-01
Data Flow Analysis
Generalization Performance
Legal Compliance

Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification

Authors: Qi Lei, Lingfei Wu, Pin-Yu Chen, Alexandros G. Dimakis, Inderjit S. Dhillon, Michael Witbrock | Published: 2018-12-01 | Updated: 2019-04-04
Application of Text Classification
Adversarial Example
Optimization Problem

Analyzing Federated Learning through an Adversarial Lens

Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo | Published: 2018-11-29 | Updated: 2019-11-25
Poisoning
Federated Learning
Weight Update Method

Joint Service Pricing and Cooperative Relay Communication for Federated Learning

Authors: Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, Ying-Chang Liang | Published: 2018-11-29
Data Collection
Optimization Problem
Federated Learning

MOBIUS: Model-Oblivious Binarized Neural Networks

Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29
Trigger Detection
Privacy-Preserving Machine Learning
Differential Privacy

An Adversarial Approach for Explainable AI in Intrusion Detection Systems

Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28
Identification of AI Output
Model Performance Evaluation
Adversarial Example

Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness

Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30
Certified Robustness
Robustness Improvement
Defense Method

Robust Classification of Financial Risk

Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27
Model Performance Evaluation
Robustness Improvement
Adversarial Learning

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15
Backdoor Detection
Model Performance Evaluation
Selection and Evaluation of Optimization Algorithms