Optimization Methods

SALSA: Attacking Lattice Cryptography with Transformers

Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter | Published: 2022-07-11 | Updated: 2023-04-21
Algorithm Design
Model Design and Accuracy
Optimization Methods

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining

Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14
Training Protocol
Privacy Enhancing Technology
Optimization Methods

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13
Poisoning
Optimization Methods
Deep Learning Technology

Designing ML-Resilient Locking at Register-Transfer Level

Authors: Dominik Sisejkovic, Luca Collini, Benjamin Tan, Christian Pilato, Ramesh Karri, Rainer Leupers | Published: 2022-03-10 | Updated: 2022-04-06
Security Metric
Robustness
Optimization Methods

Private Adaptive Optimization with Side Information

Authors: Tian Li, Manzil Zaheer, Sashank J. Reddi, Virginia Smith | Published: 2022-02-12 | Updated: 2022-06-25
Convergence Analysis
Optimization Methods
Weight Update Method

On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms

Authors: Shuyu Cheng, Guoqiang Wu, Jun Zhu | Published: 2021-07-21 | Updated: 2021-11-07
Framework
Optimization Methods
Statistical Methods

Robust Distributed Optimization With Randomly Corrupted Gradients

Authors: Berkay Turan, Cesar A. Uribe, Hoi-To Wai, Mahnoosh Alizadeh | Published: 2021-06-28 | Updated: 2022-06-17
Markov Model
Robust Regression
Optimization Methods

Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization

Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08
Reinforcement Learning
Optimization Methods
Machine Learning

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31
Data Contamination Detection
Poisoning
Optimization Methods

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08
Data Contamination Detection
Convergence Guarantee
Optimization Methods