Performance Evaluation

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23
Performance Evaluation
Adversarial Example
Adversarial Attack Detection

PassFlow: Guessing Passwords with Generative Flows

Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini | Published: 2021-05-13 | Updated: 2021-12-14
Password Guessing
Performance Evaluation
Generative Model

Automated Software Vulnerability Assessment with Concept Drift

Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21
Performance Evaluation
Concept Drift
Vulnerability Analysis

Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory

Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15
Performance Evaluation
Risk Assessment Method
Deep Learning Technology

On Ensemble Learning

Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07
Performance Evaluation
Machine Learning Application
Evaluation Method

Efficient Encrypted Inference on Ensembles of Decision Trees

Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05
Performance Evaluation
Real-Time Inference
Deep Learning Technology

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03
Performance Evaluation
Distributed Learning
Computational Efficiency

Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01
Data Privacy Assessment
Performance Evaluation
Model Performance Evaluation

Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01
Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

Adversarially Robust Classification based on GLRT

Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16
Watermarking
Performance Evaluation
Adversarial attack