Detecting Abnormal Traffic in Large-Scale Networks Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13 Multi-Class ClassificationMachine Learning MethodAnomaly Detection Method 2020.08.13 2025.05.28 Literature Database
WAFFLe: Weight Anonymized Factorization for Federated Learning Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13 PoisoningPersonalization MethodMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Multi-Task Variational Information Bottleneck Authors: Weizhu Qian, Bowei Chen, Yichao Zhang, Guanghui Wen, Franck Gechter | Published: 2020-07-01 | Updated: 2021-03-01 Algorithm DesignGeneralization PerformanceMachine Learning Method 2020.07.01 2025.05.28 Literature Database
A Le Cam Type Bound for Adversarial Learning and Applications Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10 Adversarial ExampleAdversarial attackMachine Learning Method 2020.07.01 2025.05.28 Literature Database
On Intrinsic Dataset Properties for Adversarial Machine Learning Authors: Jeffrey Z. Pan, Nicholas Zufelt | Published: 2020-05-19 PoisoningPerformance Evaluation MetricsMachine Learning Method 2020.05.19 2025.05.28 Literature Database
An Overview of Privacy in Machine Learning Authors: Emiliano De Cristofaro | Published: 2020-05-18 Privacy TechniqueMembership InferenceMachine Learning Method 2020.05.18 2025.05.28 Literature Database
A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16 Performance Evaluation MetricsMachine Learning MethodDeep Learning Technology 2020.05.16 2025.05.28 Literature Database
Encryption Inspired Adversarial Defense for Visual Classification Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16 Machine Learning AlgorithmMachine Learning MethodDefense Effectiveness Analysis 2020.05.16 2025.05.28 Literature Database
Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database