Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24 Model Performance EvaluationTrust Evaluation ModuleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11 WatermarkingModel Performance EvaluationSignal Analysis 2021.02.21 2025.05.28 Literature Database
IoTDevID: A Behavior-Based Device Identification Method for the IoT Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19 Dataset evaluationData CollectionModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14 Dataset evaluationModel Performance EvaluationAdversarial Example 2021.02.10 2025.05.28 Literature Database
“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09 PoisoningModel Performance EvaluationAttack Method 2021.02.09 2025.05.28 Literature Database
$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22 Dataset evaluationData Protection MethodModel Performance Evaluation 2021.02.09 2025.05.28 Literature Database
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.08 2025.05.28 Literature Database
Optimal Transport as a Defense Against Adversarial Attacks Authors: Quentin Bouniot, Romaric Audigier, Angélique Loesch | Published: 2021-02-05 | Updated: 2021-03-30 Model Performance EvaluationAttack MethodAdversarial Training 2021.02.05 2025.05.28 Literature Database
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models Authors: Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang | Published: 2021-02-04 | Updated: 2021-10-06 PoisoningMembership InferenceModel Performance Evaluation 2021.02.04 2025.05.28 Literature Database