Optimization Methods

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
Poisoning
Optimization Methods
Vulnerability Assessment Method

Privacy Amplification Via Bernoulli Sampling

Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18
Privacy Protection Method
Information-Theoretic Evaluation
Optimization Methods

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05
Data Management System
Privacy Protection
Optimization Methods

Statistical inference for individual fairness

Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30
Risk Assessment Method
Fairness evaluation
Optimization Methods

Enabling Homomorphically Encrypted Inference for Large DNN Models

Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29
Measurement of Memorization
Encryption Method
Optimization Methods

Graph Unlearning

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16
Data Management System
Convergence Property
Optimization Methods

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25
Vulnerability of Adversarial Examples
Optimization Methods
Wireless Channel Detection

Black-box Detection of Backdoor Attacks with Limited Information and Data

Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24
Backdoor Attack
Optimization Methods
Defense Mechanism

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24
Optimization Methods
Vulnerability Assessment Method
Defense Mechanism

CNN vs ELM for Image-Based Malware Classification

Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24
PE Malware Classification
Optimization Methods
Image Feature Extraction