A Framework of Randomized Selection Based Certified Defenses Against Data Poisoning Attacks Authors: Ruoxin Chen, Jie Li, Chentao Wu, Bin Sheng, Ping Li | Published: 2020-09-18 | Updated: 2020-10-13 Robust RegressionAdversarial TrainingMachine Learning 2020.09.18 2025.05.28 Literature Database
On Primes, Log-Loss Scores and (No) Privacy Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17 Membership InferenceMachine Learningevaluation metrics 2020.09.17 2025.05.28 Literature Database
An Extension of Fano’s Inequality for Characterizing Model Susceptibility to Membership Inference Attacks Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami | Published: 2020-09-17 Membership InferenceMachine Learning 2020.09.17 2025.05.28 Literature Database
The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt | Published: 2020-09-16 | Updated: 2021-07-25 Device Identification MethodMachine LearningCommunication Efficiency 2020.09.16 2025.05.28 Literature Database
Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30 Data GenerationSelection and Evaluation of Optimization AlgorithmsMachine Learning 2020.09.15 2025.05.28 Literature Database
Efficient Private Machine Learning by Differentiable Random Transformations Authors: Fei Zheng | Published: 2020-08-18 Membership InferenceEncryption MethodMachine Learning 2020.08.18 2025.05.28 Literature Database
New Directions in Automated Traffic Analysis Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19 WatermarkingData Extraction and AnalysisMachine Learning 2020.08.06 2025.05.28 Literature Database
Training DNN Model with Secret Key for Model Protection Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06 WatermarkingAdversarial LearningMachine Learning 2020.08.06 2025.05.28 Literature Database
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05 Attack DetectionMachine LearningAnomaly Detection Method 2020.08.05 2025.05.28 Literature Database
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence Authors: Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu | Published: 2020-08-05 Game TheoryPrivacy AssessmentMachine Learning 2020.08.05 2025.05.28 Literature Database