Training Method

Stealing Black-Box Functionality Using The Deep Neural Tree Architecture

Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23
Training Data Extraction Method
Training Method
Machine Learning Method

Boosting Adversarial Training with Hypersphere Embedding

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Kun Xu, Jun Zhu, Hang Su | Published: 2020-02-20 | Updated: 2020-11-25
Training Method
Effective Perturbation Methods
Adversarial Training

Variational Encoder-based Reliable Classification

Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17
Training Method
Robustness Evaluation
Adversarial Attack Detection

Randomized Smoothing of All Shapes and Sizes

Authors: Greg Yang, Tony Duan, J. Edward Hu, Hadi Salman, Ilya Razenshteyn, Jerry Li | Published: 2020-02-19 | Updated: 2020-07-23
Training Method
Robustness Evaluation
Definition of Mathematical Concepts

Regularized Training and Tight Certification for Randomized Smoothed Classifier with Provable Robustness

Authors: Huijie Feng, Chunpeng Wu, Guoyang Chen, Weifeng Zhang, Yang Ning | Published: 2020-02-17
Training Method
Robustness Evaluation
Efficient Proof System

Data and Model Dependencies of Membership Inference Attack

Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25
Training Method
Model Selection Method
Defense Method

Multi-Task Siamese Neural Network for Improving Replay Attack Detection

Authors: Patrick von Platen, Fei Tao, Gokhan Tur | Published: 2020-02-16
Training Method
Loss Function
Feature Extraction Method

Undersensitivity in Neural Reading Comprehension

Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15
Training Method
Vulnerability Attack Method
Defense Method

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15
Training Method
Malware Detection
Machine Learning Algorithm

Adversarial Distributional Training for Robust Deep Learning

Authors: Yinpeng Dong, Zhijie Deng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2020-02-14 | Updated: 2020-11-19
Training Method
Robustness Evaluation
Loss Function