Performance Evaluation

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26
Performance Evaluation
Attack Method
Speech Recognition Process

On the Role of Generalization in Transferability of Adversarial Examples

Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18
Impact of Generalization
Performance Evaluation
Adversarial Example

Deepfake histological images for enhancing digital pathology

Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16
Algorithm
Threats of Medical AI
Performance Evaluation

On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits

Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16
Algorithm
Online Decision Making
Performance Evaluation

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18
Membership Inference
Performance Evaluation
Attack Detection

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18
Attack Methods against DFL
Backdoor Attack
Performance Evaluation

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18
Dataset evaluation
Membership Inference
Performance Evaluation

Lessons Learned: Defending Against Property Inference Attacks

Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09
Data Preprocessing
Membership Inference
Performance Evaluation

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone | Published: 2022-05-07
User Experience Evaluation
Random Forest
Performance Evaluation

Training a Helpful and Harmless Assistant with Reinforcement Learning from Human Feedback

Authors: Yuntao Bai, Andy Jones, Kamal Ndousse, Amanda Askell, Anna Chen, Nova DasSarma, Dawn Drain, Stanislav Fort, Deep Ganguli, Tom Henighan, Nicholas Joseph, Saurav Kadavath, Jackson Kernion, Tom Conerly, Sheer El-Showk, Nelson Elhage, Zac Hatfield-Dodds, Danny Hernandez, Tristan Hume, Scott Johnston, Shauna Kravec, Liane Lovitt, Neel Nanda, Catherine Olsson, Dario Amodei, Tom Brown, Jack Clark, Sam McCandlish, Chris Olah, Ben Mann, Jared Kaplan | Published: 2022-04-12
Alignment
Reinforcement Learning Optimization
Performance Evaluation