Model Performance Evaluation

Power up! Robust Graph Convolutional Network via Graph Powering

Authors: Ming Jin, Heng Chang, Wenwu Zhu, Somayeh Sojoudi | Published: 2019-05-24 | Updated: 2021-09-21
Client Clustering
Community Detection
Model Performance Evaluation

Robust Attribution Regularization

Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2019-05-23 | Updated: 2019-10-26
Model Performance Evaluation
Robust Optimization
Regularization

Thwarting finite difference adversarial attacks with output randomization

Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener | Published: 2019-05-23
Model Performance Evaluation
Attack Detection
Adversarial Example

Adversarially Robust Distillation

Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein | Published: 2019-05-23 | Updated: 2019-12-02
Model Performance Evaluation
Attack Detection
Adversarial Example

A framework for the extraction of Deep Neural Networks by leveraging public data

Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22
Data Collection
Membership Inference
Model Performance Evaluation

Adversarial Defense Through Network Profiling Based Path Extraction

Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09
Model Performance Evaluation
Adversarial Attack Detection
Deep Learning

An Adversarial Approach for Explainable AI in Intrusion Detection Systems

Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28
Identification of AI Output
Model Performance Evaluation
Adversarial Example

Robust Classification of Financial Risk

Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27
Model Performance Evaluation
Robustness Improvement
Adversarial Learning

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15
Backdoor Detection
Model Performance Evaluation
Selection and Evaluation of Optimization Algorithms

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26
Model Performance Evaluation
Secure Arithmetic Computation
Cryptographic Protocol