Metadata-Based Detection of Child Sexual Abuse Material Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27 Dataset evaluationModel EvaluationMachine Learning 2020.10.05 2025.05.28 Literature Database
Approximate Data Deletion from Machine Learning Models Authors: Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, James Zou | Published: 2020-02-24 | Updated: 2021-02-23 Machine learningModel EvaluationRobustness Evaluation 2020.02.24 2025.05.28 Literature Database
Square Attack: a query-efficient black-box adversarial attack via random search Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29 Model EvaluationAdversarial Attack DetectionAdversarial Training 2019.11.29 2025.05.28 Literature Database
Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28 Model EvaluationAdversarial ExampleMachine Learning Algorithm 2019.11.28 2025.05.28 Literature Database
High Accuracy and High Fidelity Extraction of Neural Networks Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03 Model Extraction AttackModel EvaluationAdversarial Example 2019.09.03 2025.05.28 Literature Database
FSGAN: Subject Agnostic Face Swapping and Reenactment Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16 Data Generation MethodDeepfakeModel Evaluation 2019.08.16 2025.05.28 Literature Database
Certifiably Robust Interpretation in Deep Learning Authors: Alexander Levine, Sahil Singla, Soheil Feizi | Published: 2019-05-28 | Updated: 2019-10-17 XAI (Explainable AI)PoisoningModel Evaluation 2019.05.28 2025.05.28 Literature Database
Differential Privacy Has Disparate Impact on Model Accuracy Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2019-05-28 | Updated: 2019-10-27 Privacy ProtectionPrivacy Protection MethodModel Evaluation 2019.05.28 2025.05.28 Literature Database
Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks Authors: Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin | Published: 2019-05-28 DNN IP Protection MethodModel EvaluationDefensive Deception 2019.05.28 2025.05.28 Literature Database
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28 Model EvaluationPerformance EvaluationAdversarial Perturbation Techniques 2019.05.28 2025.05.28 Literature Database