ATRO: Adversarial Training with a Rejection Option Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24 Adversarial ExampleAdversarial Example DetectionMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
Graph Information Bottleneck Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24 Future ResearchInformation-Theoretic EvaluationMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23 Data ObfuscationPrivacy ProtectionMachine Learning Algorithm 2020.10.23 2025.05.28 Literature Database
A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22 Text Perturbation MethodCauses of Information LeakageMachine Learning Algorithm 2020.10.22 2025.05.28 Literature Database
On the Intrinsic Differential Privacy of Bagging Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22 Data GenerationInformation-Theoretic EvaluationMachine Learning Algorithm 2020.08.22 2025.05.28 Literature Database
Profile Matching Across Online Social Networks Authors: Anisa Halimi, Erman Ayday | Published: 2020-08-20 Data CollectionProfile MatchingMachine Learning Algorithm 2020.08.20 2025.05.28 Literature Database
ByGARS: Byzantine SGD with Arbitrary Number of Attackers Authors: Jayanth Regatti, Hao Chen, Abhishek Gupta | Published: 2020-06-24 | Updated: 2020-12-07 Byzantine Consensus MechanismPoisoningMachine Learning Algorithm 2020.06.24 2025.05.28 Literature Database
RayS: A Ray Searching Method for Hard-label Adversarial Attack Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05 Membership InferenceAdversarial Attack MethodsMachine Learning Algorithm 2020.06.23 2025.05.28 Literature Database
Free-rider Attacks on Model Aggregation in Federated Learning Authors: Yann Fraboni, Richard Vidal, Marco Lorenzi | Published: 2020-06-21 | Updated: 2021-02-22 Attack Methods against DFLSGD CharacteristicsMachine Learning Algorithm 2020.06.21 2025.05.28 Literature Database
Rotation-Equivariant Neural Networks for Privacy Protection Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21 Machine Learning AlgorithmFeature Extraction MethodWatermarking Technology 2020.06.21 2025.05.28 Literature Database