Optimization Methods

On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers

Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15
Adversarial attack
Optimization Methods
Machine Learning Method

BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14
Attack Evaluation
Adversarial Example
Optimization Methods

DPZero: Private Fine-Tuning of Language Models without Backpropagation

Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06
Privacy Protection
Privacy Protection Method
Optimization Methods

Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD

Authors: Moritz Knolle, Robert Dorfman, Alexander Ziller, Daniel Rueckert, Georgios Kaissis | Published: 2023-08-23
Privacy Protection Method
Convergence Analysis
Optimization Methods

Optimized Deep Learning Models for Malware Detection under Concept Drift

Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01
Performance Evaluation
Optimization Methods
Deep Learning Method

AutoReP: Automatic ReLU Replacement for Fast Private Network Inference

Authors: Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding | Published: 2023-08-20
MPC Algorithm
Model Performance Evaluation
Optimization Methods

Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms

Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01
Adversarial attack
Optimization Methods
Linear Model

Doubly Robust Instance-Reweighted Adversarial Training

Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01
Adversarial attack
Optimization Methods
Deep Learning Method

On Neural Network approximation of ideal adversarial attack and convergence of adversarial training

Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30
Convergence Property
Adversarial attack
Optimization Methods

TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning

Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29
Dataset Generation
Optimization Methods
Quantum Cryptography Technology