Linear Model

Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms

Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01
Adversarial attack
Optimization Methods
Linear Model

Robust Linear Regression: Gradient-descent, Early-stopping, and Beyond

Authors: Meyer Scetbon, Elvis Dohmatob | Published: 2023-01-31
Convergence Analysis
Optimization Methods
Linear Model

Overparameterized Linear Regression under Adversarial Attacks

Authors: Antônio H. Ribeiro, Thomas B. Schön | Published: 2022-04-13 | Updated: 2023-01-27
Adversarial Example
Machine Learning Application
Linear Model

Distribution-Invariant Differential Privacy

Authors: Xuan Bi, Xiaotong Shen | Published: 2021-11-08 | Updated: 2022-06-06
Data Selection Strategy
Privacy Risk Management
Linear Model

Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning

Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19
Algorithm
Machine Learning Application
Linear Model

Secure PAC Bayesian Regression via Real Shamir Secret Sharing

Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17
Algorithm
Privacy Risk Management
Linear Model

Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis

Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22
Blockchain Technology
Machine Learning Method
Linear Model

Perturbing Inputs to Prevent Model Stealing

Authors: Justin Grana | Published: 2020-05-12
Membership Inference
Attack Detection
Linear Model

Secure multiparty computations in floating-point arithmetic

Authors: Chuan Guo, Awni Hannun, Brian Knott, Laurens van der Maaten, Mark Tygert, Ruiyu Zhu | Published: 2020-01-09
Polynomial Approximation
Machine Learning
Linear Model

Understanding and Quantifying Adversarial Examples Existence in Linear Classification

Authors: Xupeng Shi, A. Adam Ding | Published: 2019-10-27
Adversarial Example
Linear Model
Effectiveness Analysis of Defense Methods