Model Evaluation

Metadata-Based Detection of Child Sexual Abuse Material

Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27
Dataset evaluation
Model Evaluation
Machine Learning

Approximate Data Deletion from Machine Learning Models

Authors: Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, James Zou | Published: 2020-02-24 | Updated: 2021-02-23
Machine learning
Model Evaluation
Robustness Evaluation

Square Attack: a query-efficient black-box adversarial attack via random search

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29
Model Evaluation
Adversarial Attack Detection
Adversarial Training

Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One

Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28
Model Evaluation
Adversarial Example
Machine Learning Algorithm

High Accuracy and High Fidelity Extraction of Neural Networks

Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03
Model Extraction Attack
Model Evaluation
Adversarial Example

FSGAN: Subject Agnostic Face Swapping and Reenactment

Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16
Data Generation Method
Deepfake
Model Evaluation

Certifiably Robust Interpretation in Deep Learning

Authors: Alexander Levine, Sahil Singla, Soheil Feizi | Published: 2019-05-28 | Updated: 2019-10-17
XAI (Explainable AI)
Poisoning
Model Evaluation

Differential Privacy Has Disparate Impact on Model Accuracy

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2019-05-28 | Updated: 2019-10-27
Privacy Protection
Privacy Protection Method
Model Evaluation

Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks

Authors: Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin | Published: 2019-05-28
DNN IP Protection Method
Model Evaluation
Defensive Deception

ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation

Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28
Model Evaluation
Performance Evaluation
Adversarial Perturbation Techniques