Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 AlgorithmAttack DetectionAdversarial Training 2020.05.11 2025.05.28 Literature Database
Cloud-based Federated Boosting for Mobile Crowdsensing Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09 AlgorithmCryptographyFederated Learning System 2020.05.09 2025.05.28 Literature Database
Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01 AlgorithmStability AssessmentExpression of Gratitude 2020.05.08 2025.05.28 Literature Database
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.28 Literature Database
Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06 AlgorithmRobustness Improvement MethodAdversarial Attack Detection 2020.05.06 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database
Differentially Private Collaborative Intrusion Detection Systems For VANETs Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02 AlgorithmPrivacy AnalysisPrivacy Assessment 2020.05.02 2025.05.28 Literature Database
Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01 AlgorithmAdversarial ExampleOptimization Strategy 2020.05.01 2025.05.28 Literature Database
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29 AlgorithmAdversarial Attack DetectionRole of Machine Learning 2020.04.29 2025.05.28 Literature Database