Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28 Model EvaluationAdversarial attack 2018.07.20 2025.05.28 Literature Database
Sequence to Logic with Copy and Cache Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19 Model Design and AccuracyModel EvaluationRobustness Evaluation 2018.07.19 2025.05.28 Literature Database
Model Reconstruction from Model Explanations Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13 Query DiversityModel Extraction AttackModel Evaluation 2018.07.13 2025.05.28 Literature Database
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12 Model EvaluationAdversarial attackEncryption Technology 2018.07.12 2025.05.28 Literature Database
Differentially-Private “Draw and Discard” Machine Learning Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng | Published: 2018-07-11 | Updated: 2018-10-10 Privacy AssessmentModel EvaluationDifferential Privacy 2018.07.11 2025.05.28 Literature Database
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27 Model EvaluationAdversarial Example DetectionAdversarial Learning 2018.07.10 2025.05.28 Literature Database
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25 Model EvaluationUser Behavior AnalysisRisk Assessment 2018.01.25 2025.05.28 Literature Database