Model Performance Evaluation

Local Competition and Stochasticity for Adversarial Robustness in Deep Learning

Authors: Konstantinos P. Panousis, Sotirios Chatzis, Antonios Alexos, Sergios Theodoridis | Published: 2021-01-04 | Updated: 2021-03-29
Poisoning
Model Performance Evaluation
Deep Learning Method

Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01
Data Privacy Assessment
Performance Evaluation
Model Performance Evaluation

Voting based ensemble improves robustness of defensive models

Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28
Model Performance Evaluation
Attack Type
Adversarial attack

Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2020-11-23 | Updated: 2021-10-12
Model Performance Evaluation
Adversarial Example
Adversarial attack

Beta-CoRM: A Bayesian Approach for $n$-gram Profiles Analysis

Authors: José A. Perusquía, Jim E. Griffin, Cristiano Villa | Published: 2020-11-23 | Updated: 2024-09-02
Model Performance Evaluation
Feature Engineering
Generative Model Characteristics

Toward a Next Generation Particle Precipitation Model: Mesoscale Prediction Through Machine Learning (a Case Study and Framework for Progress)

Authors: Ryan M. McGranaghan, Jack Ziegler, Téo Bloch, Spencer Hatch, Enrico Camporeale, Kristina Lynch, Mathew Owens, Jesper Gjerloev, Binzheng Zhang, Susan Skone | Published: 2020-11-19 | Updated: 2021-06-28
Model Performance Evaluation
Climate Data Collection
Generative Model Characteristics

Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations

Authors: Jinyuan Jia, Binghui Wang, Xiaoyu Cao, Hongbin Liu, Neil Zhenqiang Gong | Published: 2020-11-15 | Updated: 2022-06-03
Model Performance Evaluation
Stability of Predictions
Adversarial attack

Machine Learning Interpretability Meets TLS Fingerprinting

Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12
Data Leakage
Model Performance Evaluation
Deep Learning-Based IDS

ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks

Authors: Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha | Published: 2020-11-11 | Updated: 2023-07-06
TEE Implementation
Watermarking
Model Performance Evaluation

Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18
Model Performance Evaluation
Adversarial Example
Adversarial attack