Machine Learning Algorithm

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
Adversarial Example
Adversarial Example Detection
Machine Learning Algorithm

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24
Future Research
Information-Theoretic Evaluation
Machine Learning Algorithm

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23
Data Obfuscation
Privacy Protection
Machine Learning Algorithm

A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22
Text Perturbation Method
Causes of Information Leakage
Machine Learning Algorithm

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22
Data Generation
Information-Theoretic Evaluation
Machine Learning Algorithm

Profile Matching Across Online Social Networks

Authors: Anisa Halimi, Erman Ayday | Published: 2020-08-20
Data Collection
Profile Matching
Machine Learning Algorithm

ByGARS: Byzantine SGD with Arbitrary Number of Attackers

Authors: Jayanth Regatti, Hao Chen, Abhishek Gupta | Published: 2020-06-24 | Updated: 2020-12-07
Byzantine Consensus Mechanism
Poisoning
Machine Learning Algorithm

RayS: A Ray Searching Method for Hard-label Adversarial Attack

Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05
Membership Inference
Adversarial Attack Methods
Machine Learning Algorithm

Free-rider Attacks on Model Aggregation in Federated Learning

Authors: Yann Fraboni, Richard Vidal, Marco Lorenzi | Published: 2020-06-21 | Updated: 2021-02-22
Attack Methods against DFL
SGD Characteristics
Machine Learning Algorithm

Rotation-Equivariant Neural Networks for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21
Machine Learning Algorithm
Feature Extraction Method
Watermarking Technology