Convergence Analysis

A Theoretical View of Linear Backpropagation and Its Convergence

Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10
Model Design
Convergence Analysis
Defense Method

Random Noise Defense Against Query-Based Black-Box Attacks

Authors: Zeyu Qin, Yanbo Fan, Hongyuan Zha, Baoyuan Wu | Published: 2021-04-23 | Updated: 2021-10-30
Convergence Analysis
Adversarial Example Detection
Defense Mechanism

Decentralized Federated Averaging

Authors: Tao Sun, Dongsheng Li, Bao Wang | Published: 2021-04-23
Convergence Analysis
Optimization Problem
Communication Analysis

BROADCAST: Reducing Both Stochastic and Compression Noise to Robustify Communication-Efficient Federated Learning

Authors: Heng Zhu, Qing Ling | Published: 2021-04-14 | Updated: 2022-04-11
Byzantine Consensus Mechanism
Convergence Analysis
Optimization Problem

Robust Classification Under $\ell_0$ Attack for the Gaussian Mixture Model

Authors: Payam Delgosha, Hamed Hassani, Ramtin Pedarsani | Published: 2021-04-05
Convergence Analysis
Adversarial Example
Optimization Problem

Buffered Asynchronous SGD for Byzantine Learning

Authors: Yi-Rui Yang, Wu-Jun Li | Published: 2020-03-02 | Updated: 2022-01-31
Training Method
Convergence Analysis
Performance Evaluation Metrics

Universal Approximation with Certified Networks

Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14
Convergence Analysis
Information Security
Machine Learning Technology

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

Authors: Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly | Published: 2019-09-30 | Updated: 2020-06-17
Poisoning
Convergence Analysis
Adversarial attack

Sign-OPT: A Query-Efficient Hard-label Adversarial Attack

Authors: Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, Cho-Jui Hsieh | Published: 2019-09-24 | Updated: 2020-02-14
Convergence Analysis
Taxonomy of Attacks
Adversarial attack

Differentially Private ADMM for Distributed Medical Machine Learning

Authors: Jiahao Ding, Xiaoqi Qin, Wenjun Xu, Yanmin Gong, Chi Zhang, Miao Pan | Published: 2019-01-07 | Updated: 2020-12-09
Privacy-Preserving Algorithm
Convergence Analysis
Differential Privacy