DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20 Adversarial attackMachine Learning MethodDimensionality Reduction Method 2023.11.20 2025.05.28 Literature Database
Instability of computer vision models is a necessary result of the task itself Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26 Robustness EvaluationAdversarial ExampleDimensionality Reduction Method 2023.10.26 2025.05.28 Literature Database
Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09 PoisoningDimensionality Reduction MethodFederated Learning 2023.09.25 2025.05.28 Literature Database
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2020-07-13 | Updated: 2021-06-11 Attack MethodDimensionality Reduction MethodDeep Learning 2020.07.13 2025.05.28 Literature Database
QEBA: Query-Efficient Boundary-Based Blackbox Attack Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28 Adversarial Attack MethodsPrivacy Protection in Machine LearningDimensionality Reduction Method 2020.05.28 2025.05.28 Literature Database
Privacy-Preserving Machine Learning Using EtC Images Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01 Privacy ManagementDimensionality Reduction MethodIntellectual Property Protection 2019.11.01 2025.05.28 Literature Database
Active Subspace of Neural Networks: Structural Analysis and Universal Attacks Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29 Risks of Model CompressionAttack MethodDimensionality Reduction Method 2019.10.29 2025.05.28 Literature Database
Locally Differentially Private Naive Bayes Classification Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03 Privacy TechniqueMachine LearningDimensionality Reduction Method 2019.05.03 2025.05.28 Literature Database
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 Privacy Enhancing TechnologyDimensionality Reduction Method 2018.03.27 2025.05.28 Literature Database