Model Evaluation

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28
Model Evaluation
Adversarial attack

Sequence to Logic with Copy and Cache

Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19
Model Design and Accuracy
Model Evaluation
Robustness Evaluation

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13
Query Diversity
Model Extraction Attack
Model Evaluation

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12
Model Evaluation
Adversarial attack
Encryption Technology

Differentially-Private “Draw and Discard” Machine Learning

Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng | Published: 2018-07-11 | Updated: 2018-10-10
Privacy Assessment
Model Evaluation
Differential Privacy

A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks

Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27
Model Evaluation
Adversarial Example Detection
Adversarial Learning

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers

Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25
Model Evaluation
User Behavior Analysis
Risk Assessment