Optimization Methods

Understanding Gradient Clipping in Private SGD: A Geometric Perspective

Authors: Xiangyi Chen, Zhiwei Steven Wu, Mingyi Hong | Published: 2020-06-27 | Updated: 2021-03-18
Algorithm Design
Privacy Leakage
Optimization Methods

Provably Robust Metric Learning

Authors: Lu Wang, Xuanqing Liu, Jinfeng Yi, Yuan Jiang, Cho-Jui Hsieh | Published: 2020-06-12 | Updated: 2020-12-19
Algorithm
Adversarial Attack Detection
Optimization Methods

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27
Algorithm
Attack Evaluation
Optimization Methods

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Local Differential Privacy based Federated Learning for Internet of Things

Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22
Privacy Enhancing Technology
Optimization Methods
Machine Learning

Poisoning Attacks on Algorithmic Fairness

Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26
Algorithm Fairness
Poisoning
Optimization Methods

Hidden Cost of Randomized Smoothing

Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12
Robustness Evaluation
Optimization Methods
Vulnerability Analysis

Bayesian Neural Networks With Maximum Mean Discrepancy Regularization

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2020-03-02 | Updated: 2020-09-30
Training Method
Uncertainty Measurement
Optimization Methods

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14
Robustness Evaluation
Optimization Methods
Deep Learning

Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert

Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18
Adversarial Learning
Optimization Methods
Statistical Methods