Model Performance Evaluation

Suspicion-Free Adversarial Attacks on Clustering Algorithms

Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16
Model Performance Evaluation
Numerical Stability Issues
Adversarial Attack Methods

DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers

Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14
Botnet Detection
Model Performance Evaluation
Adversarial Attack Methods

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

On Robustness to Adversarial Examples and Polynomial Optimization

Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12
Model Performance Evaluation
Adversarial Attack Methods
Computational Problem

RAD: On-line Anomaly Detection for Highly Unreliable Data

Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11
Class Imbalance
Data Leakage
Model Performance Evaluation

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
Model Performance Evaluation
Adversarial Attack Methods
Feature Engineering

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
Model Performance Evaluation
Adversarial Attack Methods
Knowledge Transferability

Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks

Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04
Model Performance Evaluation
Numerical Stability Issues
Role of Machine Learning

Automatic Driver Identification from In-Vehicle Network Logs

Authors: Mina Remeli, Szilvia Lestyan, Gergely Acs, Gergely Biczok | Published: 2019-10-25
Privacy Violation
Model Performance Evaluation
Vehicle Network Security

Partially Encrypted Machine Learning using Functional Encryption

Authors: Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval | Published: 2019-05-24 | Updated: 2021-09-23
Privacy Technique
Model Performance Evaluation
Adversarial Learning