Adversarial Attacks on Gaussian Process Bandits Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16 Algorithm DesignTrade-off AnalysisAdversarial Attack Methods 2021.10.16 2025.05.28 Literature Database
MDLdroid: a ChainSGD-reduce Approach to Mobile Deep Learning for Personal Mobile Sensing Authors: Yu Zhang, Tao Gu, Xi Zhang | Published: 2020-02-07 | Updated: 2020-02-15 Scheduling MethodTrade-off AnalysisReinforcement Learning Environment 2020.02.07 2025.05.28 Literature Database
Adversarial Robustness of Flow-Based Generative Models Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20 Trade-off AnalysisModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26 Trade-off AnalysisTraining MethodAdversarial Example 2019.07.26 2025.05.28 Literature Database