Algorithm

Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data

Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10
Algorithm
Attack Detection
Adversarial Training

Cloud-based Federated Boosting for Mobile Crowdsensing

Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09
Algorithm
Cryptography
Federated Learning System

Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm

Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01
Algorithm
Stability Assessment
Expression of Gratitude

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06
Algorithm
Robustness Improvement Method
Adversarial Attack Detection

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29
Algorithm
Poisoning
evaluation metrics

Differentially Private Collaborative Intrusion Detection Systems For VANETs

Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02
Algorithm
Privacy Analysis
Privacy Assessment

Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees

Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01
Algorithm
Adversarial Example
Optimization Strategy

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
Algorithm
Adversarial Attack Detection
Role of Machine Learning