Selection and Evaluation of Optimization Algorithms

Dual-Mandate Patrols: Multi-Armed Bandits for Green Security

Authors: Lily Xu, Elizabeth Bondi, Fei Fang, Andrew Perrault, Kai Wang, Milind Tambe | Published: 2020-09-14 | Updated: 2024-04-26
Reward Mechanism Design
Performance Evaluation Metrics
Selection and Evaluation of Optimization Algorithms

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22
Adversarial attack
Selection and Evaluation of Optimization Algorithms
Anomaly Detection Algorithm

Learning to Learn by Zeroth-Order Oracle

Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07
Performance Evaluation
Loss Term
Selection and Evaluation of Optimization Algorithms

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective

Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14
Adversarial Learning
Selection and Evaluation of Optimization Algorithms
Defense Method

You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle

Authors: Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, Bin Dong | Published: 2019-05-02 | Updated: 2019-11-01
Selection and Evaluation of Optimization Algorithms
Machine Learning
Adaptive Adversarial Training

Function Space Particle Optimization for Bayesian Neural Networks

Authors: Ziyu Wang, Tongzheng Ren, Jun Zhu, Bo Zhang | Published: 2019-02-26 | Updated: 2019-05-08
Robustness Evaluation
Convergence Property
Selection and Evaluation of Optimization Algorithms

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15
Backdoor Detection
Model Performance Evaluation
Selection and Evaluation of Optimization Algorithms

Private Selection from Private Candidates

Authors: Jingcheng Liu, Kunal Talwar | Published: 2018-11-19
Differential Privacy
Selection and Evaluation of Optimization Algorithms
Statistical Analysis

How to Use Heuristics for Differential Privacy

Authors: Seth Neel, Aaron Roth, Zhiwei Steven Wu | Published: 2018-11-19
Synthetic Data Generation
Differential Privacy
Selection and Evaluation of Optimization Algorithms

Bayesian Compression for Deep Learning

Authors: Christos Louizos, Karen Ullrich, Max Welling | Published: 2017-05-24 | Updated: 2017-11-06
Parameter Identification
Pruning Method
Selection and Evaluation of Optimization Algorithms