Thwarting finite difference adversarial attacks with output randomization Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener | Published: 2019-05-23 Model Performance EvaluationAttack DetectionAdversarial Example 2019.05.23 2025.05.28 Literature Database
Adversarially Robust Distillation Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein | Published: 2019-05-23 | Updated: 2019-12-02 Model Performance EvaluationAttack DetectionAdversarial Example 2019.05.23 2025.05.28 Literature Database
A framework for the extraction of Deep Neural Networks by leveraging public data Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22 Data CollectionMembership InferenceModel Performance Evaluation 2019.05.22 2025.05.28 Literature Database
Adversarial Defense Through Network Profiling Based Path Extraction Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09 Model Performance EvaluationAdversarial Attack DetectionDeep Learning 2019.04.17 2025.05.28 Literature Database
An Adversarial Approach for Explainable AI in Intrusion Detection Systems Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28 Identification of AI OutputModel Performance EvaluationAdversarial Example 2018.11.28 2025.05.28 Literature Database
Robust Classification of Financial Risk Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.27 2025.05.28 Literature Database
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15 Backdoor DetectionModel Performance EvaluationSelection and Evaluation of Optimization Algorithms 2018.11.27 2025.05.28 Literature Database
Distributed and Secure ML with Self-tallying Multi-party Aggregation Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26 Model Performance EvaluationSecure Arithmetic ComputationCryptographic Protocol 2018.11.26 2025.05.28 Literature Database
Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25 Trigger DetectionModel Performance EvaluationEncryption Technology 2018.11.25 2025.05.28 Literature Database
Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18 FR Detection MechanismData CollectionModel Performance Evaluation 2018.11.18 2025.05.28 Literature Database