Model Performance Evaluation

Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity

Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27
Data Privacy Assessment
Privacy Protection
Model Performance Evaluation

Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11
Model Performance Evaluation
Reverse Engineering
Adversarial attack

BODAME: Bilevel Optimization for Defense Against Model Extraction

Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11
Model Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17
Model Performance Evaluation
User Behavior Analysis
Deep Learning Method

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
Model Performance Evaluation
Adversarial attack
Vulnerability Analysis

Proof-of-Learning: Definitions and Practice

Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09
Data Dependency
Model Performance Evaluation
Adversarial attack

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency

Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09
Model Performance Evaluation
Deep Learning Method
Watermark Evaluation

Adversarial Information Bottleneck

Authors: Penglong Zhai, Shihua Zhang | Published: 2021-02-28 | Updated: 2021-03-03
Model Performance Evaluation
Adversarial Example
Adversarial Training

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24
Model Performance Evaluation
Trust Evaluation Module
Adversarial Example Detection

A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization

Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11
Watermarking
Model Performance Evaluation
Signal Analysis