Characterizing the Weight Space for Different Learning Models Authors: Saurav Musunuru, Jay N. Paranjape, Rahul Kumar Dubey, Vijendran G. Venkoparao | Published: 2020-06-04 AlgorithmAdversarial Attack DetectionFundamentals of Machine Learning 2020.06.04 2025.05.28 Literature Database
Pruning via Iterative Ranking of Sensitivity Statistics Authors: Stijn Verdenius, Maarten Stol, Patrick Forré | Published: 2020-06-01 | Updated: 2020-06-14 AlgorithmSparse ModelFundamentals of Machine Learning 2020.06.01 2025.05.28 Literature Database
Some Geometrical and Topological Properties of DNNs’ Decision Boundaries Authors: Bo Liu, Mengya Shen | Published: 2020-03-07 | Updated: 2021-04-16 Robustness EvaluationMathematical FoundationsFundamentals of Machine Learning 2020.03.07 2025.05.28 Literature Database
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08 Adversarial Attack DetectionFundamentals of Machine LearningDeep Reinforcement Learning 2020.01.27 2025.05.28 Literature Database
Adversarial Model Extraction on Graph Neural Networks Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16 Graph Neural NetworkModel DesignFundamentals of Machine Learning 2019.12.16 2025.05.28 Literature Database
Constructing a provably adversarially-robust classifier from a high accuracy one Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2019-12-16 RobustnessFundamentals of Machine LearningStatistical Analysis 2019.12.16 2025.05.28 Literature Database
Machine Unlearning Authors: Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot | Published: 2019-12-09 | Updated: 2020-12-15 Privacy ProtectionFundamentals of Machine LearningAdaptive Retraining Mechanism 2019.12.09 2025.05.28 Literature Database
Preservation of Anomalous Subgroups On Machine Learning Transformed Data Authors: Samuel C. Maina, Reginald E. Bryant, William O. Goal, Robert-Florian Samoilescu, Kush R. Varshney, Komminist Weldemariam | Published: 2019-11-09 Privacy-Preserving AlgorithmPrivacy AssessmentFundamentals of Machine Learning 2019.11.09 2025.05.28 Literature Database
AutoIDS: Auto-encoder Based Method for Intrusion Detection System Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08 Security MetricAttack DetectionFundamentals of Machine Learning 2019.11.08 2025.05.28 Literature Database