Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01 Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2020.11.19 2025.05.28 Literature Database
Adversarially Robust Classification based on GLRT Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16 WatermarkingPerformance EvaluationAdversarial attack 2020.11.16 2025.05.28 Literature Database
A Large-Scale Database for Graph Representation Learning Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07 Dataset GenerationPerformance EvaluationMalware Detection Method 2020.11.16 2025.05.28 Literature Database
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier | Published: 2020-11-15 | Updated: 2021-04-18 WatermarkingPerformance EvaluationAttack Type 2020.11.15 2025.05.28 Literature Database
The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06 Data Privacy AssessmentPerformance EvaluationSelection and Evaluation of Optimization Algorithms 2020.11.08 2025.05.28 Literature Database
Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26 DP-SGDPerformance EvaluationOptimization Methods 2020.10.18 2025.05.28 Literature Database
BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08 Performance EvaluationPrivacy AssessmentAttack Pattern Extraction 2020.07.08 2025.05.28 Literature Database
Adversarial Self-Supervised Contrastive Learning Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26 Performance EvaluationPoisoningAdversarial Attack Detection 2020.06.13 2025.05.28 Literature Database
Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02 Backdoor AttackPerformance EvaluationAttack Scenario Analysis 2020.06.11 2025.05.28 Literature Database
Interpolation between Residual and Non-Residual Networks Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16 AlgorithmPerformance EvaluationImprovement of Learning 2020.06.10 2025.05.28 Literature Database