Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests Authors: Sean Kulinski, Saurabh Bagchi, David I. Inouye | Published: 2021-07-14 Data Contamination DetectionConcept DriftStatistical Testing 2021.07.14 2025.05.28 Literature Database
Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30 Data Contamination DetectionAdversarial attackVulnerability Assessment Method 2021.06.05 2025.05.28 Literature Database
Gradient-based Data Subversion Attack Against Binary Classifiers Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31 Data Contamination DetectionPoisoningOptimization Methods 2021.05.31 2025.05.28 Literature Database
DeepMoM: Robust Deep Learning With Median-of-Means Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08 Data Contamination DetectionConvergence GuaranteeOptimization Methods 2021.05.28 2025.05.28 Literature Database
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 Data Contamination DetectionPoisoningVulnerability Assessment Method 2021.05.26 2025.05.28 Literature Database
GraphSAC: Detecting anomalies in large-scale graphs Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Representation LearningData Contamination DetectionPerformance Evaluation 2019.10.21 2025.05.28 Literature Database
CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23 ML-Based IDSCyber ThreatData Contamination Detection 2019.07.23 2025.05.28 Literature Database
A Grid Based Adversarial Clustering Algorithm Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21 Data Contamination DetectionAdversarial Attack AnalysisAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database