Deep Learning Method

On sparse connectivity, adversarial robustness, and a novel model of the artificial neuron

Authors: Sergey Bochkanov | Published: 2020-06-16
Algorithm Design
Performance Evaluation
Deep Learning Method

New Interpretations of Normalization Methods in Deep Learning

Authors: Jiacheng Sun, Xiangyong Cao, Hanwen Liang, Weiran Huang, Zewei Chen, Zhenguo Li | Published: 2020-06-16
Hyperparameter Optimization
Regularization
Deep Learning Method

SPLASH: Learnable Activation Functions for Improving Accuracy and Adversarial Robustness

Authors: Mohammadamin Tavakoli, Forest Agostinelli, Pierre Baldi | Published: 2020-06-16
Performance Evaluation
Adversarial Example
Deep Learning Method

CryptoNAS: Private Inference on a ReLU Budget

Authors: Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg | Published: 2020-06-15 | Updated: 2021-05-13
Cryptography
Privacy Protection in Machine Learning
Deep Learning Method

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24
Performance Evaluation
Deep Learning Method
Vulnerability detection

Self-supervised Learning: Generative or Contrastive

Authors: Xiao Liu, Fanjin Zhang, Zhenyu Hou, Zhaoyu Wang, Li Mian, Jing Zhang, Jie Tang | Published: 2020-06-15 | Updated: 2021-03-20
Task Adaptation Method
Deep Learning Method
Self-Supervised Learning

Robust Variational Autoencoder for Tabular Data with Beta Divergence

Authors: Haleh Akrami, Sergul Aydore, Richard M. Leahy, Anand A. Joshi | Published: 2020-06-15 | Updated: 2020-06-16
Algorithm Design
Machine Learning Application
Deep Learning Method

Provably robust deep generative models

Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22
Robustness Improvement Method
Adversarial attack
Deep Learning Method

Probabilistic Safety for Bayesian Neural Networks

Authors: Matthew Wicker, Luca Laurenti, Andrea Patane, Marta Kwiatkowska | Published: 2020-04-21 | Updated: 2020-06-19
Bayesian Security
Robustness Evaluation
Deep Learning Method

Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2020-03-05 | Updated: 2020-10-29
Machine learning
Information Hiding Techniques
Deep Learning Method