Federated Learning with Matched Averaging Authors: Hongyi Wang, Mikhail Yurochkin, Yuekai Sun, Dimitris Papailiopoulos, Yasaman Khazaeni | Published: 2020-02-15 Optimization StrategyDeep Learning MethodFederated Learning 2020.02.15 2025.05.28 Literature Database
Fast is better than free: Revisiting adversarial training Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12 Adversarial ExampleAdversarial attackDeep Learning Method 2020.01.12 2025.05.28 Literature Database
Campfire: Compressible, Regularization-Free, Structured Sparse Training for Hardware Accelerators Authors: Noah Gamboa, Kais Kudrolli, Anand Dhoot, Ardavan Pedram | Published: 2020-01-09 | Updated: 2020-01-13 Pruning MethodRobustness EvaluationDeep Learning Method 2020.01.09 2025.05.28 Literature Database
Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15 Privacy ProtectionPerformance Evaluation MetricsDeep Learning Method 2019.12.18 2025.05.28 Literature Database
DAmageNet: A Universal Adversarial Dataset Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16 Data GenerationRobustnessDeep Learning Method 2019.12.16 2025.05.28 Literature Database
Potential adversarial samples for white-box attacks Authors: Amir Nazemi, Paul Fieguth | Published: 2019-12-13 RobustnessAdversarial Spectrum Attack DetectionDeep Learning Method 2019.12.13 2025.05.28 Literature Database
Detecting and Correcting Adversarial Images Using Image Processing Operations Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30 Adversarial Spectrum Attack DetectionDeep Learning MethodWatermarking Technology 2019.12.11 2025.05.28 Literature Database
Training Provably Robust Models by Polyhedral Envelope Regularization Authors: Chen Liu, Mathieu Salzmann, Sabine Süsstrunk | Published: 2019-12-10 | Updated: 2021-09-20 RobustnessOptimization ProblemDeep Learning Method 2019.12.10 2025.05.28 Literature Database
Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data Authors: Itay Mosafi, Eli David, Nathan S. Netanyahu | Published: 2019-12-09 DNN IP Protection MethodAdversarial ExampleDeep Learning Method 2019.12.09 2025.05.28 Literature Database
An Empirical Study on the Relation between Network Interpretability and Adversarial Robustness Authors: Adam Noack, Isaac Ahern, Dejing Dou, Boyang Li | Published: 2019-12-07 | Updated: 2020-12-04 RobustnessLoss FunctionDeep Learning Method 2019.12.07 2025.05.28 Literature Database