SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05 Robustness EvaluationTrust Evaluation ModuleVulnerability Analysis 2022.05.05 2025.05.28 Literature Database
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection Authors: João Vitorino, Nuno Oliveira, Isabel Praça | Published: 2022-03-08 | Updated: 2022-03-29 DDoS AttackData GenerationRobustness Evaluation 2022.03.08 2025.05.28 Literature Database
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08 Data GenerationRobustness EvaluationDefense Method 2022.03.08 2025.05.28 Literature Database
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15 Dataset GenerationRobustness EvaluationOptimization Strategy 2022.03.07 2025.05.28 Literature Database
A Characterization of Semi-Supervised Adversarially-Robust PAC Learnability Authors: Idan Attias, Steve Hanneke, Yishay Mansour | Published: 2022-02-11 | Updated: 2024-05-05 Algorithm DesignData Selection StrategyRobustness Evaluation 2022.02.11 2025.05.28 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 Dataset evaluationPoisoningRobustness Evaluation 2022.02.05 2025.05.28 Literature Database
A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28 Algorithm DesignRobustness EvaluationConvergence Analysis 2022.02.03 2025.05.28 Literature Database
A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04 Algorithm DesignRobustness EvaluationAdversarial Attack Methods 2021.12.28 2025.05.28 Literature Database
PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy Authors: Xiaolan Gu, Ming Li, Li Xiong | Published: 2021-10-22 Privacy ProtectionPoisoningRobustness Evaluation 2021.10.22 2025.05.28 Literature Database