Literature Database

Defining a Metric Space of Host Logs and Operational Use Cases

Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01
Client Clustering
Digital Forensics
Anomaly Detection in Logs

Auditing Data Provenance in Text-Generation Models

Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17
Integration of Digital Signatures and Machine Learning
Privacy Assurance
Membership Inference

Excessive Invariance Causes Adversarial Vulnerability

Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12
Model Inversion
Adversarial Example
Adversarial Training

Conditionals in Homomorphic Encryption and Machine Learning Applications

Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09
Privacy Assurance
Performance Evaluation
Cryptography

Logit Pairing Methods Can Fool Gradient-Based Attacks

Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12
robustness requirements
Adversarial Learning
Adversarial Training

Rademacher Complexity for Adversarially Robust Generalization

Authors: Dong Yin, Kannan Ramchandran, Peter Bartlett | Published: 2018-10-29 | Updated: 2020-07-29
Certified Robustness
robustness requirements
Adversarial Training

Learning with Bad Training Data via Iterative Trimmed Loss Minimization

Authors: Yanyao Shen, Sujay Sanghavi | Published: 2018-10-28 | Updated: 2019-02-18
Data Curation
Poisoning
Robust Estimation

Robust Audio Adversarial Example for a Physical Attack

Authors: Hiromu Yakura, Jun Sakuma | Published: 2018-10-28 | Updated: 2019-08-19
Backdoor Attack
Signal Processing Techniques
Adversarial Example

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27
Trigger Detection
Mathematical Analysis
Adversarial Learning

Towards Robust Deep Neural Networks

Authors: Timothy E. Wang, Yiming Gu, Dhagash Mehta, Xiaojun Zhao, Edgar A. Bernal | Published: 2018-10-27 | Updated: 2018-12-04
Certified Robustness
Robust Estimation
Loss Function