Deep Learning Method

An Empirical Study on the Intrinsic Privacy of SGD

Authors: Stephanie L. Hyland, Shruti Tople | Published: 2019-12-05 | Updated: 2022-02-28
SGD Characteristics
Privacy Protection
Deep Learning Method

Design and Interpretation of Universal Adversarial Patches in Face Detection

Authors: Xiao Yang, Fangyun Wei, Hongyang Zhang, Jun Zhu | Published: 2019-11-30 | Updated: 2020-07-17
Adversarial Spectrum Attack Detection
Optimization Problem
Deep Learning Method

Automatic Detection of Generated Text is Easiest when Humans are Fooled

Authors: Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, Douglas Eck | Published: 2019-11-02 | Updated: 2020-05-07
Identification of AI Output
Text Perturbation Method
Deep Learning Method

Confident Learning: Estimating Uncertainty in Dataset Labels

Authors: Curtis G. Northcutt, Lu Jiang, Isaac L. Chuang | Published: 2019-10-31 | Updated: 2022-08-22
Data Curation
Quantification of Uncertainty
Deep Learning Method

Road Context-aware Intrusion Detection System for Autonomous Cars

Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02
Intrusion Detection System
Information Security
Deep Learning Method

Black-box Adversarial ML Attack on Modulation Classification

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01
Information Security
Adversarial Learning
Deep Learning Method

Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning

Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16
Adversarial attack
Deep Learning Method
Weight Update Method

Recovery Guarantees for Compressible Signals with Adversarial Noise

Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07
Algorithm Design
Adversarial attack
Deep Learning Method

Measuring the Transferability of Adversarial Examples

Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14
Adversarial Example
Adversarial attack
Deep Learning Method

Adversarial Objects Against LiDAR-Based Autonomous Driving Systems

Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11
Adversarial Example
Adversarial attack
Deep Learning Method