Model Performance Evaluation

Thwarting finite difference adversarial attacks with output randomization

Authors: Haidar Khan, Daniel Park, Azer Khan, Bülent Yener | Published: 2019-05-23
Model Performance Evaluation
Attack Detection
Adversarial Example

Adversarially Robust Distillation

Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein | Published: 2019-05-23 | Updated: 2019-12-02
Model Performance Evaluation
Attack Detection
Adversarial Example

A framework for the extraction of Deep Neural Networks by leveraging public data

Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22
Data Collection
Membership Inference
Model Performance Evaluation

Adversarial Defense Through Network Profiling Based Path Extraction

Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09
Model Performance Evaluation
Adversarial Attack Detection
Deep Learning

An Adversarial Approach for Explainable AI in Intrusion Detection Systems

Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28
Identification of AI Output
Model Performance Evaluation
Adversarial Example

Robust Classification of Financial Risk

Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27
Model Performance Evaluation
Robustness Improvement
Adversarial Learning

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15
Backdoor Detection
Model Performance Evaluation
Selection and Evaluation of Optimization Algorithms

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26
Model Performance Evaluation
Secure Arithmetic Computation
Cryptographic Protocol

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Trigger Detection
Model Performance Evaluation
Encryption Technology

Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining

Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18
FR Detection Mechanism
Data Collection
Model Performance Evaluation