Sampling without Replacement Leads to Faster Rates in Finite-Sum Minimax Optimization Authors: Aniket Das, Bernhard Schölkopf, Michael Muehlebach | Published: 2022-06-07 | Updated: 2022-10-10 Convergence analysisFormal VerificationFunction Definition 2022.06.07 2025.05.28 Literature Database
Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks Authors: Aline R. Ioste, Alan M. Durham, Marcelo Finger | Published: 2022-04-30 Distributed LearningConvergence analysisExperimental Validation 2022.04.30 2025.05.28 Literature Database
Optimal Accounting of Differential Privacy via Characteristic Function Authors: Yuqing Zhu, Jinshuo Dong, Yu-Xiang Wang | Published: 2021-06-16 | Updated: 2022-05-31 Privacy Enhancing TechnologyConvergence analysisOptimization Problem 2021.06.16 2025.05.28 Literature Database
Stochastic Alternating Direction Method of Multipliers for Byzantine-Robust Distributed Learning Authors: Feng Lin, Weiyu Li, Qing Ling | Published: 2021-06-13 Efficiency of Distributed LearningConvergence analysisSelection and Evaluation of Optimization Algorithms 2021.06.13 2025.05.28 Literature Database
A simple way to make neural networks robust against diverse image corruptions Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22 Robustness AnalysisConvergence analysisAdversarial Learning 2020.01.16 2025.05.28 Literature Database
A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30 Convergence analysisAttack MethodContent Specialized for Toxicity Attacks 2019.10.30 2025.05.28 Literature Database
Zeroth-Order Stochastic Alternating Direction Method of Multipliers for Nonconvex Nonsmooth Optimization Authors: Feihu Huang, Shangqian Gao, Songcan Chen, Heng Huang | Published: 2019-05-29 | Updated: 2019-07-30 Convergence analysisOptimization MethodsPrivacy Protection in Machine Learning 2019.05.29 2025.05.28 Literature Database
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack Authors: Haishan Ye, Zhichao Huang, Cong Fang, Chris Junchi Li, Tong Zhang | Published: 2018-12-29 | Updated: 2019-03-20 Machine learningConvergence analysisDeep Learning 2018.12.29 2025.05.28 Literature Database
Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform Authors: Mitali Bafna, Jack Murtagh, Nikhil Vyas | Published: 2018-12-12 RobustnessConvergence analysisAdversarial Example Detection 2018.12.12 2025.05.28 Literature Database
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack Authors: Arash Rahnama, Panos J. Antsaklis | Published: 2017-09-28 Byzantine Consensus MechanismConvergence analysisAnomaly Detection Method 2017.09.28 2025.05.28 Literature Database