IoTDevID: A Behavior-Based Device Identification Method for the IoT Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19 Dataset evaluationData CollectionModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14 Dataset evaluationModel Performance EvaluationAdversarial Example 2021.02.10 2025.05.28 Literature Database
“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09 PoisoningModel Performance EvaluationAttack Method 2021.02.09 2025.05.28 Literature Database
$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22 Dataset evaluationData Protection MethodModel Performance Evaluation 2021.02.09 2025.05.28 Literature Database
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.08 2025.05.28 Literature Database
Optimal Transport as a Defense Against Adversarial Attacks Authors: Quentin Bouniot, Romaric Audigier, Angélique Loesch | Published: 2021-02-05 | Updated: 2021-03-30 Model Performance EvaluationAttack MethodAdversarial Training 2021.02.05 2025.05.28 Literature Database
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models Authors: Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang | Published: 2021-02-04 | Updated: 2021-10-06 PoisoningMembership InferenceModel Performance Evaluation 2021.02.04 2025.05.28 Literature Database
Adversarially Robust Learning with Unknown Perturbation Sets Authors: Omar Montasser, Steve Hanneke, Nathan Srebro | Published: 2021-02-03 Model Performance EvaluationAdversarial Example DetectionAdversarial Training 2021.02.03 2025.05.28 Literature Database
Fast Training of Provably Robust Neural Networks by SingleProp Authors: Akhilan Boopathy, Tsui-Wei Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel | Published: 2021-02-01 Backdoor AttackModel Performance EvaluationAdversarial Training 2021.02.01 2025.05.28 Literature Database