How benign is benign overfitting? Authors: Amartya Sanyal, Puneet K Dokania, Varun Kanade, Philip H. S. Torr | Published: 2020-07-08 Adversarial ExampleAdversarial LearningOverfitting and Memorization 2020.07.08 2025.05.28 Literature Database
Defending against Backdoors in Federated Learning with Robust Learning Rate Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Yulia R. Gel | Published: 2020-07-07 | Updated: 2021-07-29 Backdoor AttackAdversarial LearningDefense Mechanism 2020.07.07 2025.05.28 Literature Database
Backdoor attacks and defenses in feature-partitioned collaborative learning Authors: Yang Liu, Zhihao Yi, Tianjian Chen | Published: 2020-07-07 PoisoningAdversarial LearningDefense Mechanism 2020.07.07 2025.05.28 Literature Database
Stochastic Linear Bandits Robust to Adversarial Attacks Authors: Ilija Bogunovic, Arpan Losalka, Andreas Krause, Jonathan Scarlett | Published: 2020-07-07 | Updated: 2020-10-27 Quantification of UncertaintyAdversarial LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Robust Learning with Frequency Domain Regularization Authors: Weiyu Guo, Yidong Ouyang | Published: 2020-07-07 Adversarial LearningFundamentals of Machine LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability Authors: Utku Ozbulak, Jonathan Peck, Wesley De Neve, Bart Goossens, Yvan Saeys, Arnout Van Messem | Published: 2020-07-07 | Updated: 2020-07-18 Attack Pattern ExtractionAdversarial ExampleAdversarial Learning 2020.07.07 2025.05.28 Literature Database
Black-box Adversarial Example Generation with Normalizing Flows Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-06 Adversarial LearningChallenges of Generative ModelsComputational Efficiency 2020.07.06 2025.05.28 Literature Database
On Data Augmentation and Adversarial Risk: An Empirical Analysis Authors: Hamid Eghbal-zadeh, Khaled Koutini, Paul Primus, Verena Haunschmid, Michal Lewandowski, Werner Zellinger, Bernhard A. Moser, Gerhard Widmer | Published: 2020-07-06 PoisoningRisk ManagementAdversarial Learning 2020.07.06 2025.05.28 Literature Database
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain Authors: Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2020-07-05 | Updated: 2021-03-13 Adversarial ExampleAdversarial LearningFeature Importance Analysis 2020.07.05 2025.05.28 Literature Database
Relationship between manifold smoothness and adversarial vulnerability in deep learning with local errors Authors: Zijian Jiang, Jianwen Zhou, Haiping Huang | Published: 2020-07-04 | Updated: 2020-12-23 Factors of Performance DegradationAdversarial ExampleAdversarial Learning 2020.07.04 2025.05.28 Literature Database