An Adversarial Approach for Explaining the Predictions of Deep Neural Networks Authors: Arash Rahnama, Andrew Tseng | Published: 2020-05-20 | Updated: 2020-09-28 AlgorithmPoisoningStatistical Analysis 2020.05.20 2025.05.28 Literature Database
Graph Structure Learning for Robust Graph Neural Networks Authors: Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, Jiliang Tang | Published: 2020-05-20 | Updated: 2020-06-27 AlgorithmGraph Representation LearningOptimization Strategy 2020.05.20 2025.05.28 Literature Database
Continuous LWE Authors: Joan Bruna, Oded Regev, Min Jae Song, Yi Tang | Published: 2020-05-19 | Updated: 2020-10-24 AlgorithmComputational ProblemQuantum Information and Quantum Computing 2020.05.19 2025.05.28 Literature Database
Enhancing Certified Robustness via Smoothed Weighted Ensembling Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23 AlgorithmGeneralization PerformanceResearch Methodology 2020.05.19 2025.05.28 Literature Database
A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database
Universal Adversarial Perturbations: A Survey Authors: Ashutosh Chaubey, Nikhil Agrawal, Kavya Barnwal, Keerat K. Guliani, Pramod Mehta | Published: 2020-05-16 AlgorithmLoss FunctionAdversarial Example 2020.05.16 2025.05.28 Literature Database
Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data Authors: Deepesh Data, Suhas Diggavi | Published: 2020-05-16 AlgorithmLoss FunctionMachine Learning Algorithm 2020.05.16 2025.05.28 Literature Database
Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13 AlgorithmExplainability of Graph Machine LearningDefense Effectiveness Analysis 2020.05.13 2025.05.28 Literature Database
Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18 AlgorithmRobustness EvaluationFactors of Performance Degradation 2020.05.12 2025.05.28 Literature Database