Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified Models Authors: Changyu Liu, Yuling Jiao, Junhui Wang, Jian Huang | Published: 2023-09-02 Convergence PropertyLoss TermAdversarial attack 2023.09.02 2025.05.28 Literature Database
Large-Scale Public Data Improves Differentially Private Image Generation Quality Authors: Ruihan Wu, Chuan Guo, Kamalika Chaudhuri | Published: 2023-08-04 Data GenerationPrivacy Protection MethodConvergence Property 2023.08.04 2025.05.28 Literature Database
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30 Convergence PropertyAdversarial attackOptimization Methods 2023.07.30 2025.05.28 Literature Database
Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile Authors: Tyler LeBlond, Joseph Munoz, Fred Lu, Maya Fuchs, Elliott Zaresky-Williams, Edward Raff, Brian Testa | Published: 2023-06-27 Privacy AssessmentConvergence GuaranteeConvergence Property 2023.06.27 2025.05.28 Literature Database
Byzantine-Robust Clustered Federated Learning Authors: Zhixu Tao, Kun Yang, Sanjeev R. Kulkarni | Published: 2023-06-01 Byzantine Consensus MechanismConvergence PropertyLoss Term 2023.06.01 2025.05.28 Literature Database
Improved Privacy-Preserving PCA Using Optimized Homomorphic Matrix Multiplication Authors: Xirong Ma | Published: 2023-05-27 | Updated: 2023-08-17 Privacy Protection MethodConvergence PropertyEncryption Method 2023.05.27 2025.05.28 Literature Database
On the Optimal Batch Size for Byzantine-Robust Distributed Learning Authors: Yi-Rui Yang, Chang-Wei Shi, Wu-Jun Li | Published: 2023-05-23 Byzantine Consensus MechanismConvergence PropertyMachine Learning Method 2023.05.23 2025.05.28 Literature Database
Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02 Data Contamination DetectionPoisoningConvergence Property 2023.03.29 2025.05.28 Literature Database
How many dimensions are required to find an adversarial example? Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11 Convergence PropertyAdversarial ExampleMachine Learning Technology 2023.03.24 2025.05.28 Literature Database
Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13 Privacy Enhancing TechnologyRisk Assessment MethodConvergence Property 2023.03.13 2025.05.28 Literature Database