Understanding Gradient Clipping in Private SGD: A Geometric Perspective Authors: Xiangyi Chen, Zhiwei Steven Wu, Mingyi Hong | Published: 2020-06-27 | Updated: 2021-03-18 Algorithm DesignPrivacy LeakageOptimization Methods 2020.06.27 2025.05.28 Literature Database
Provably Robust Metric Learning Authors: Lu Wang, Xuanqing Liu, Jinfeng Yi, Yuan Jiang, Cho-Jui Hsieh | Published: 2020-06-12 | Updated: 2020-12-19 AlgorithmAdversarial Attack DetectionOptimization Methods 2020.06.12 2025.05.28 Literature Database
Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27 AlgorithmAttack EvaluationOptimization Methods 2020.05.27 2025.05.28 Literature Database
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Local Differential Privacy based Federated Learning for Internet of Things Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22 Privacy Enhancing TechnologyOptimization MethodsMachine Learning 2020.04.19 2025.05.28 Literature Database
Poisoning Attacks on Algorithmic Fairness Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26 Algorithm FairnessPoisoningOptimization Methods 2020.04.15 2025.05.28 Literature Database
Hidden Cost of Randomized Smoothing Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12 Robustness EvaluationOptimization MethodsVulnerability Analysis 2020.03.02 2025.05.28 Literature Database
Bayesian Neural Networks With Maximum Mean Discrepancy Regularization Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2020-03-02 | Updated: 2020-09-30 Training MethodUncertainty MeasurementOptimization Methods 2020.03.02 2025.05.28 Literature Database
MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14 Robustness EvaluationOptimization MethodsDeep Learning 2020.01.08 2025.05.28 Literature Database
Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18 Adversarial LearningOptimization MethodsStatistical Methods 2020.01.02 2025.05.28 Literature Database