Convergence Property

Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified Models

Authors: Changyu Liu, Yuling Jiao, Junhui Wang, Jian Huang | Published: 2023-09-02
Convergence Property
Loss Term
Adversarial attack

Large-Scale Public Data Improves Differentially Private Image Generation Quality

Authors: Ruihan Wu, Chuan Guo, Kamalika Chaudhuri | Published: 2023-08-04
Data Generation
Privacy Protection Method
Convergence Property

On Neural Network approximation of ideal adversarial attack and convergence of adversarial training

Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30
Convergence Property
Adversarial attack
Optimization Methods

Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile

Authors: Tyler LeBlond, Joseph Munoz, Fred Lu, Maya Fuchs, Elliott Zaresky-Williams, Edward Raff, Brian Testa | Published: 2023-06-27
Privacy Assessment
Convergence Guarantee
Convergence Property

Byzantine-Robust Clustered Federated Learning

Authors: Zhixu Tao, Kun Yang, Sanjeev R. Kulkarni | Published: 2023-06-01
Byzantine Consensus Mechanism
Convergence Property
Loss Term

Improved Privacy-Preserving PCA Using Optimized Homomorphic Matrix Multiplication

Authors: Xirong Ma | Published: 2023-05-27 | Updated: 2023-08-17
Privacy Protection Method
Convergence Property
Encryption Method

On the Optimal Batch Size for Byzantine-Robust Distributed Learning

Authors: Yi-Rui Yang, Chang-Wei Shi, Wu-Jun Li | Published: 2023-05-23
Byzantine Consensus Mechanism
Convergence Property
Machine Learning Method

Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02
Data Contamination Detection
Poisoning
Convergence Property

How many dimensions are required to find an adversarial example?

Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11
Convergence Property
Adversarial Example
Machine Learning Technology

Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13
Privacy Enhancing Technology
Risk Assessment Method
Convergence Property