Approximate Data Deletion from Machine Learning Models Authors: Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, James Zou | Published: 2020-02-24 | Updated: 2021-02-23 Machine learningModel EvaluationRobustness Evaluation 2020.02.24 2025.05.28 Literature Database
Campfire: Compressible, Regularization-Free, Structured Sparse Training for Hardware Accelerators Authors: Noah Gamboa, Kais Kudrolli, Anand Dhoot, Ardavan Pedram | Published: 2020-01-09 | Updated: 2020-01-13 Pruning MethodRobustness EvaluationDeep Learning Method 2020.01.09 2025.05.28 Literature Database
MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14 Robustness EvaluationOptimization MethodsDeep Learning 2020.01.08 2025.05.28 Literature Database
Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07 Clustering methodsRobustness EvaluationAdversarial Learning 2020.01.07 2025.05.28 Literature Database
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07 Robustness EvaluationMalicious ClientAdversarial Learning 2020.01.07 2025.05.28 Literature Database
Federated Variance-Reduced Stochastic Gradient Descent with Robustness to Byzantine Attacks Authors: Zhaoxian Wu, Qing Ling, Tianyi Chen, Georgios B. Giannakis | Published: 2019-12-29 | Updated: 2021-02-03 SGD CharacteristicsRobustness EvaluationAdversarial Learning 2019.12.29 2025.05.28 Literature Database
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer Authors: Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr | Published: 2019-12-24 Privacy Protection MethodRobustness EvaluationMalicious Client 2019.12.24 2025.05.28 Literature Database
Towards Verifying Robustness of Neural Networks Against Semantic Perturbations Authors: Jeet Mohapatra, Tsui-Wei, Weng, Pin-Yu Chen, Sijia Liu, Luca Daniel | Published: 2019-12-19 | Updated: 2020-06-15 Robustness EvaluationAdversarial LearningDeep Learning 2019.12.19 2025.05.28 Literature Database
Explanations can be manipulated and geometry is to blame Authors: Ann-Kathrin Dombrowski, Maximilian Alber, Christopher J. Anders, Marcel Ackermann, Klaus-Robert Müller, Pan Kessel | Published: 2019-06-19 | Updated: 2019-09-25 Model InterpretabilityRobustness EvaluationAttacks on Explainability 2019.06.19 2025.05.28 Literature Database
Rob-GAN: Generator, Discriminator, and Adversarial Attacker Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15 Robustness EvaluationAdversarial LearningAdversarial attack 2018.07.27 2025.05.28 Literature Database