On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15 Adversarial attackOptimization MethodsMachine Learning Method 2023.10.19 2025.05.28 Literature Database
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14 Attack EvaluationAdversarial ExampleOptimization Methods 2023.10.14 2025.05.28 Literature Database
DPZero: Private Fine-Tuning of Language Models without Backpropagation Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06 Privacy ProtectionPrivacy Protection MethodOptimization Methods 2023.10.14 2025.05.28 Literature Database
Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD Authors: Moritz Knolle, Robert Dorfman, Alexander Ziller, Daniel Rueckert, Georgios Kaissis | Published: 2023-08-23 Privacy Protection MethodConvergence AnalysisOptimization Methods 2023.08.23 2025.05.28 Literature Database
Optimized Deep Learning Models for Malware Detection under Concept Drift Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01 Performance EvaluationOptimization MethodsDeep Learning Method 2023.08.21 2025.05.28 Literature Database
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference Authors: Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding | Published: 2023-08-20 MPC AlgorithmModel Performance EvaluationOptimization Methods 2023.08.20 2025.05.28 Literature Database
Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01 Adversarial attackOptimization MethodsLinear Model 2023.08.01 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30 Convergence PropertyAdversarial attackOptimization Methods 2023.07.30 2025.05.28 Literature Database
TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29 Dataset GenerationOptimization MethodsQuantum Cryptography Technology 2023.06.29 2025.05.28 Literature Database