Dimensionality Reduction Method

DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20
Adversarial attack
Machine Learning Method
Dimensionality Reduction Method

Instability of computer vision models is a necessary result of the task itself

Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26
Robustness Evaluation
Adversarial Example
Dimensionality Reduction Method

Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing

Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09
Poisoning
Dimensionality Reduction Method
Federated Learning

Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes

Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2020-07-13 | Updated: 2021-06-11
Attack Method
Dimensionality Reduction Method
Deep Learning

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28
Adversarial Attack Methods
Privacy Protection in Machine Learning
Dimensionality Reduction Method

Privacy-Preserving Machine Learning Using EtC Images

Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01
Privacy Management
Dimensionality Reduction Method
Intellectual Property Protection

Active Subspace of Neural Networks: Structural Analysis and Universal Attacks

Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29
Risks of Model Compression
Attack Method
Dimensionality Reduction Method

Locally Differentially Private Naive Bayes Classification

Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03
Privacy Technique
Machine Learning
Dimensionality Reduction Method

Privacy Preserving Machine Learning: Threats and Solutions

Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27
Privacy Enhancing Technology
Dimensionality Reduction Method