An Empirical Study on the Intrinsic Privacy of SGD Authors: Stephanie L. Hyland, Shruti Tople | Published: 2019-12-05 | Updated: 2022-02-28 SGD CharacteristicsPrivacy ProtectionDeep Learning Method 2019.12.05 2025.05.28 Literature Database
Design and Interpretation of Universal Adversarial Patches in Face Detection Authors: Xiao Yang, Fangyun Wei, Hongyang Zhang, Jun Zhu | Published: 2019-11-30 | Updated: 2020-07-17 Adversarial Spectrum Attack DetectionOptimization ProblemDeep Learning Method 2019.11.30 2025.05.28 Literature Database
Automatic Detection of Generated Text is Easiest when Humans are Fooled Authors: Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, Douglas Eck | Published: 2019-11-02 | Updated: 2020-05-07 Identification of AI OutputText Perturbation MethodDeep Learning Method 2019.11.02 2025.05.28 Literature Database
Confident Learning: Estimating Uncertainty in Dataset Labels Authors: Curtis G. Northcutt, Lu Jiang, Isaac L. Chuang | Published: 2019-10-31 | Updated: 2022-08-22 Data CurationQuantification of UncertaintyDeep Learning Method 2019.10.31 2025.05.28 Literature Database
Road Context-aware Intrusion Detection System for Autonomous Cars Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02 Intrusion Detection SystemInformation SecurityDeep Learning Method 2019.08.02 2025.05.28 Literature Database
Black-box Adversarial ML Attack on Modulation Classification Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01 Information SecurityAdversarial LearningDeep Learning Method 2019.08.01 2025.05.28 Literature Database
Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16 Adversarial attackDeep Learning MethodWeight Update Method 2019.07.16 2025.05.28 Literature Database
Recovery Guarantees for Compressible Signals with Adversarial Noise Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07 Algorithm DesignAdversarial attackDeep Learning Method 2019.07.15 2025.05.28 Literature Database
Measuring the Transferability of Adversarial Examples Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.14 2025.05.28 Literature Database
Adversarial Objects Against LiDAR-Based Autonomous Driving Systems Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.11 2025.05.28 Literature Database