GraphSAC: Detecting anomalies in large-scale graphs Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Representation LearningData Contamination DetectionPerformance Evaluation 2019.10.21 2025.05.28 Literature Database
Learning to Learn by Zeroth-Order Oracle Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07 Performance EvaluationLoss TermSelection and Evaluation of Optimization Algorithms 2019.10.21 2025.05.28 Literature Database
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28 Network Traffic AnalysisPerformance EvaluationMachine Learning Method 2019.10.21 2025.05.28 Literature Database
Deep k-NN Defense against Clean-label Data Poisoning Attacks Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13 Backdoor AttackPerformance EvaluationDetection of Poisonous Data 2019.09.29 2025.05.28 Literature Database
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 Security AnalysisPerformance EvaluationAdversarial Learning 2019.09.13 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 Performance EvaluationAdversarial ExampleAdversarial Learning 2019.09.13 2025.05.28 Literature Database
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29 CKKS OptimizationPerformance EvaluationEncryption Technology 2019.08.12 2025.05.28 Literature Database
A systematic review of fuzzing based on machine learning techniques Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04 Data Generation MethodPerformance EvaluationMachine Learning 2019.08.04 2025.05.28 Literature Database
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10 Security AssurancePrivacy ProtectionPerformance Evaluation 2019.07.24 2025.05.28 Literature Database
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28 Model EvaluationPerformance EvaluationAdversarial Perturbation Techniques 2019.05.28 2025.05.28 Literature Database