Deep Learning Method

Convergence of Adversarial Training in Overparametrized Neural Networks

Authors: Ruiqi Gao, Tianle Cai, Haochuan Li, Liwei Wang, Cho-Jui Hsieh, Jason D. Lee | Published: 2019-06-19 | Updated: 2019-11-09
robustness requirements
Adversarial Example
Deep Learning Method

Real or Fake? Learning to Discriminate Machine from Human Generated Text

Authors: Anton Bakhtin, Sam Gross, Myle Ott, Yuntian Deng, Marc'Aurelio Ranzato, Arthur Szlam | Published: 2019-06-07 | Updated: 2019-11-25
Identification of AI Output
Energy-Based Model
Deep Learning Method

Can You Trust Your Model’s Uncertainty? Evaluating Predictive Uncertainty Under Dataset Shift

Authors: Yaniv Ovadia, Emily Fertig, Jie Ren, Zachary Nado, D Sculley, Sebastian Nowozin, Joshua V. Dillon, Balaji Lakshminarayanan, Jasper Snoek | Published: 2019-06-06 | Updated: 2019-12-17
Quantification of Uncertainty
Uncertainty Assessment
Deep Learning Method

Fast and Stable Interval Bounds Propagation for Training Verifiably Robust Models

Authors: Paweł Morawiecki, Przemysław Spurek, Marek Śmieja, Jacek Tabor | Published: 2019-06-03 | Updated: 2019-07-03
Robustness Verification Method
Expression of Gratitude
Deep Learning Method

IoT Network Security from the Perspective of Adversarial Deep Learning

Authors: Yalin E. Sagduyu, Yi Shi, Tugba Erpek | Published: 2019-05-31
Adversarial Example
Adversarial Spectrum Attack Detection
Deep Learning Method

Unlabeled Data Improves Adversarial Robustness

Authors: Yair Carmon, Aditi Raghunathan, Ludwig Schmidt, Percy Liang, John C. Duchi | Published: 2019-05-31 | Updated: 2022-01-13
Poisoning
Robustness Verification Method
Deep Learning Method

L0 Regularization Based Neural Network Design and Compression

Authors: S. Asim Ahmed | Published: 2019-05-31
Optimization Strategy
Deep Learning Method
Deep Learning Technology

Defending Against Neural Fake News

Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11
Identification of AI Output
Cyber Threat
Deep Learning Method

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method