Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Robust GANs against Dishonest Adversaries Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10 Robust EstimationAdversarial Attack AnalysisAdversarial Training 2018.02.27 2025.05.28 Literature Database
On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27 Adversarial Example DetectionAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Yedrouj-Net: An efficient CNN for spatial steganalysis Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26 Privacy Design PrinciplesMachine Learning TechnologyResearch Methodology 2018.02.26 2025.05.28 Literature Database
Scalable Private Learning with PATE Authors: Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson | Published: 2018-02-24 Privacy TechniqueDifferential PrivacyDistance Recovery Algorithm 2018.02.24 2025.05.28 Literature Database
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks Authors: Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song | Published: 2018-02-22 | Updated: 2019-07-16 Privacy Protection MechanismDifferential PrivacyInformation-Theoretic Evaluation 2018.02.22 2025.05.28 Literature Database
Asynchronous Byzantine Machine Learning (the case of SGD) Authors: Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, Mahsa Taziki | Published: 2018-02-22 | Updated: 2018-07-09 Methods to Address Dynamic Byzantine BehaviorMachine Learning MethodAdaptive Learning Rate 2018.02.22 2025.05.28 Literature Database
The Hidden Vulnerability of Distributed Learning in Byzantium Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17 PoisoningAdversarial attackMachine Learning Method 2018.02.22 2025.05.28 Literature Database
Adversarial Training for Probabilistic Spiking Neural Networks Authors: Alireza Bagheri, Osvaldo Simeone, Bipin Rajendran | Published: 2018-02-22 | Updated: 2018-02-26 Spiking Neural NetworkAdversarial LearningAdversarial Training 2018.02.22 2025.05.28 Literature Database
Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning Authors: Christopher Frederickson, Michael Moore, Glenn Dawson, Robi Polikar | Published: 2018-02-20 PoisoningAdversarial Example DetectionAdversarial attack 2018.02.20 2025.05.28 Literature Database