Performance Evaluation

Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01
Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

Adversarially Robust Classification based on GLRT

Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16
Watermarking
Performance Evaluation
Adversarial attack

A Large-Scale Database for Graph Representation Learning

Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07
Dataset Generation
Performance Evaluation
Malware Detection Method

Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier | Published: 2020-11-15 | Updated: 2021-04-18
Watermarking
Performance Evaluation
Attack Type

The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06
Data Privacy Assessment
Performance Evaluation
Selection and Evaluation of Optimization Algorithms

Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization

Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26
DP-SGD
Performance Evaluation
Optimization Methods

BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning

Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08
Performance Evaluation
Privacy Assessment
Attack Pattern Extraction

Adversarial Self-Supervised Contrastive Learning

Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26
Performance Evaluation
Poisoning
Adversarial Attack Detection

Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02
Backdoor Attack
Performance Evaluation
Attack Scenario Analysis

Interpolation between Residual and Non-Residual Networks

Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16
Algorithm
Performance Evaluation
Improvement of Learning