Stealing Black-Box Functionality Using The Deep Neural Tree Architecture Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23 Training Data Extraction MethodTraining MethodMachine Learning Method 2020.02.23 2025.05.28 Literature Database
Boosting Adversarial Training with Hypersphere Embedding Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Kun Xu, Jun Zhu, Hang Su | Published: 2020-02-20 | Updated: 2020-11-25 Training MethodEffective Perturbation MethodsAdversarial Training 2020.02.20 2025.05.28 Literature Database
Variational Encoder-based Reliable Classification Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17 Training MethodRobustness EvaluationAdversarial Attack Detection 2020.02.19 2025.05.28 Literature Database
Randomized Smoothing of All Shapes and Sizes Authors: Greg Yang, Tony Duan, J. Edward Hu, Hadi Salman, Ilya Razenshteyn, Jerry Li | Published: 2020-02-19 | Updated: 2020-07-23 Training MethodRobustness EvaluationDefinition of Mathematical Concepts 2020.02.19 2025.05.28 Literature Database
Regularized Training and Tight Certification for Randomized Smoothed Classifier with Provable Robustness Authors: Huijie Feng, Chunpeng Wu, Guoyang Chen, Weifeng Zhang, Yang Ning | Published: 2020-02-17 Training MethodRobustness EvaluationEfficient Proof System 2020.02.17 2025.05.28 Literature Database
Data and Model Dependencies of Membership Inference Attack Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25 Training MethodModel Selection MethodDefense Method 2020.02.17 2025.05.28 Literature Database
Multi-Task Siamese Neural Network for Improving Replay Attack Detection Authors: Patrick von Platen, Fei Tao, Gokhan Tur | Published: 2020-02-16 Training MethodLoss FunctionFeature Extraction Method 2020.02.16 2025.05.28 Literature Database
Undersensitivity in Neural Reading Comprehension Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15 Training MethodVulnerability Attack MethodDefense Method 2020.02.15 2025.05.28 Literature Database
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15 Training MethodMalware DetectionMachine Learning Algorithm 2020.02.15 2025.05.28 Literature Database
Adversarial Distributional Training for Robust Deep Learning Authors: Yinpeng Dong, Zhijie Deng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2020-02-14 | Updated: 2020-11-19 Training MethodRobustness EvaluationLoss Function 2020.02.14 2025.05.28 Literature Database