How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 Algorithm DesignAdversarial ExampleComputational Efficiency 2022.06.28 2025.05.28 Literature Database
Parallel Instance Filtering for Malware Detection Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28 Algorithm DesignComputational EfficiencyStatic Analysis 2022.06.28 2025.05.28 Literature Database
Multifamily Malware Models Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27 Algorithm DesignMalware Propagation MeansEvaluation Method 2022.06.27 2025.05.28 Literature Database
Adversarially Robust PAC Learnability of Real-Valued Functions Authors: Idan Attias, Steve Hanneke | Published: 2022-06-26 | Updated: 2024-05-05 Algorithm DesignSampling MethodImprovement of Learning 2022.06.26 2025.05.28 Literature Database
Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25 Algorithm DesignImprovement of LearningAdversarial Attack Methods 2022.06.25 2025.05.28 Literature Database
Using Autoencoders on Differentially Private Federated Learning GANs Authors: Gregor Schram, Rui Wang, Kaitai Liang | Published: 2022-06-24 Algorithm DesignImprovement of LearningChallenges of Generative Models 2022.06.24 2025.05.28 Literature Database
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11 Algorithm DesignFormal VerificationAdversarial Example 2022.06.24 2025.05.28 Literature Database
“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11 Algorithm DesignPerformance EvaluationPrivacy Protection Mechanism 2022.06.24 2025.05.28 Literature Database
Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25 Algorithm DesignDeep Learning TechnologySelf-Supervised Learning 2022.06.23 2025.05.28 Literature Database
A Framework for Understanding Model Extraction Attack and Defense Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23 Algorithm DesignMembership InferenceAdversarial Learning 2022.06.23 2025.05.28 Literature Database