SALSA: Attacking Lattice Cryptography with Transformers Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter | Published: 2022-07-11 | Updated: 2023-04-21 Algorithm DesignModel Design and AccuracyOptimization Methods 2022.07.11 2025.05.28 Literature Database
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14 Training ProtocolPrivacy Enhancing TechnologyOptimization Methods 2022.03.14 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13 PoisoningOptimization MethodsDeep Learning Technology 2022.03.13 2025.05.28 Literature Database
Designing ML-Resilient Locking at Register-Transfer Level Authors: Dominik Sisejkovic, Luca Collini, Benjamin Tan, Christian Pilato, Ramesh Karri, Rainer Leupers | Published: 2022-03-10 | Updated: 2022-04-06 Security MetricRobustnessOptimization Methods 2022.03.10 2025.05.28 Literature Database
Private Adaptive Optimization with Side Information Authors: Tian Li, Manzil Zaheer, Sashank J. Reddi, Virginia Smith | Published: 2022-02-12 | Updated: 2022-06-25 Convergence AnalysisOptimization MethodsWeight Update Method 2022.02.12 2025.05.28 Literature Database
On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms Authors: Shuyu Cheng, Guoqiang Wu, Jun Zhu | Published: 2021-07-21 | Updated: 2021-11-07 FrameworkOptimization MethodsStatistical Methods 2021.07.21 2025.05.28 Literature Database
Robust Distributed Optimization With Randomly Corrupted Gradients Authors: Berkay Turan, Cesar A. Uribe, Hoi-To Wai, Mahnoosh Alizadeh | Published: 2021-06-28 | Updated: 2022-06-17 Markov ModelRobust RegressionOptimization Methods 2021.06.28 2025.05.28 Literature Database
Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08 Reinforcement LearningOptimization MethodsMachine Learning 2021.06.08 2025.05.28 Literature Database
Gradient-based Data Subversion Attack Against Binary Classifiers Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31 Data Contamination DetectionPoisoningOptimization Methods 2021.05.31 2025.05.28 Literature Database
DeepMoM: Robust Deep Learning With Median-of-Means Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08 Data Contamination DetectionConvergence GuaranteeOptimization Methods 2021.05.28 2025.05.28 Literature Database