Literature Database

Understanding and Enhancing the Transferability of Adversarial Examples

Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27
Model evaluation methods
Adversarial Learning
Adversarial Attack Analysis

Robust GANs against Dishonest Adversaries

Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10
Robust Estimation
Adversarial Attack Analysis
Adversarial Training

On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27
Adversarial Example Detection
Adversarial Attack Analysis
Machine Learning Technology

Yedrouj-Net: An efficient CNN for spatial steganalysis

Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26
Privacy Design Principles
Machine Learning Technology
Research Methodology

Scalable Private Learning with PATE

Authors: Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson | Published: 2018-02-24
Privacy Technique
Differential Privacy
Distance Recovery Algorithm

The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks

Authors: Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song | Published: 2018-02-22 | Updated: 2019-07-16
Privacy Protection Mechanism
Differential Privacy
Information-Theoretic Evaluation

Asynchronous Byzantine Machine Learning (the case of SGD)

Authors: Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, Mahsa Taziki | Published: 2018-02-22 | Updated: 2018-07-09
Methods to Address Dynamic Byzantine Behavior
Machine Learning Method
Adaptive Learning Rate

The Hidden Vulnerability of Distributed Learning in Byzantium

Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17
Poisoning
Adversarial attack
Machine Learning Method

Adversarial Training for Probabilistic Spiking Neural Networks

Authors: Alireza Bagheri, Osvaldo Simeone, Bipin Rajendran | Published: 2018-02-22 | Updated: 2018-02-26
Spiking Neural Network
Adversarial Learning
Adversarial Training

Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning

Authors: Christopher Frederickson, Michael Moore, Glenn Dawson, Robi Polikar | Published: 2018-02-20
Poisoning
Adversarial Example Detection
Adversarial attack