There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 Model Performance EvaluationAdversarial Attack MethodsComputational Problem 2019.11.12 2025.05.28 Literature Database
RAD: On-line Anomaly Detection for Highly Unreliable Data Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11 Class ImbalanceData LeakageModel Performance Evaluation 2019.11.11 2025.05.28 Literature Database
Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 Model Performance EvaluationAdversarial Attack MethodsFeature Engineering 2019.11.08 2025.05.28 Literature Database
White-Box Target Attack for EEG-Based BCI Regression Problems Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07 Model Performance EvaluationAdversarial Attack MethodsKnowledge Transferability 2019.11.07 2025.05.28 Literature Database
Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04 Model Performance EvaluationNumerical Stability IssuesRole of Machine Learning 2019.11.04 2025.05.28 Literature Database
Automatic Driver Identification from In-Vehicle Network Logs Authors: Mina Remeli, Szilvia Lestyan, Gergely Acs, Gergely Biczok | Published: 2019-10-25 Privacy ViolationModel Performance EvaluationVehicle Network Security 2019.10.25 2025.05.28 Literature Database
Partially Encrypted Machine Learning using Functional Encryption Authors: Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval | Published: 2019-05-24 | Updated: 2021-09-23 Privacy TechniqueModel Performance EvaluationAdversarial Learning 2019.05.24 2025.05.28 Literature Database
Power up! Robust Graph Convolutional Network via Graph Powering Authors: Ming Jin, Heng Chang, Wenwu Zhu, Somayeh Sojoudi | Published: 2019-05-24 | Updated: 2021-09-21 Client ClusteringCommunity DetectionModel Performance Evaluation 2019.05.24 2025.05.28 Literature Database
Robust Attribution Regularization Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2019-05-23 | Updated: 2019-10-26 Model Performance EvaluationRobust OptimizationRegularization 2019.05.23 2025.05.28 Literature Database