Performance Evaluation

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08
Privacy Protection
Efficiency Evaluation
Performance Evaluation

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26
Performance Evaluation
Deep Learning Technology
Image Feature Extraction

Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks

Authors: Alexander Levine, Soheil Feizi | Published: 2019-10-23
Wasserstein Distance
Performance Evaluation
Adversarial Example

Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms

Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29
Adversarial Learning
Performance Evaluation
Adversarial Transferability

GraphSAC: Detecting anomalies in large-scale graphs

Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21
Graph Representation Learning
Data Contamination Detection
Performance Evaluation

Learning to Learn by Zeroth-Order Oracle

Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07
Performance Evaluation
Loss Term
Selection and Evaluation of Optimization Algorithms

Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection

Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28
Network Traffic Analysis
Performance Evaluation
Machine Learning Method

Deep k-NN Defense against Clean-label Data Poisoning Attacks

Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13
Backdoor Attack
Performance Evaluation
Detection of Poisonous Data

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13
Security Analysis
Performance Evaluation
Adversarial Learning

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13
Performance Evaluation
Adversarial Example
Adversarial Learning