ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 Performance EvaluationPolynomial ApproximationComputational Problem 2025.07.09 2025.07.11 Literature Database
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning Authors: Greg Gluch, Shafi Goldwasser | Published: 2025-04-28 | Updated: 2025-07-10 Certified RobustnessAdversarial attackComputational Problem 2025.04.28 2025.07.12 Literature Database
Continuous LWE Authors: Joan Bruna, Oded Regev, Min Jae Song, Yi Tang | Published: 2020-05-19 | Updated: 2020-10-24 AlgorithmComputational ProblemQuantum Information and Quantum Computing 2020.05.19 2025.05.28 Literature Database
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 Model Performance EvaluationAdversarial Attack MethodsComputational Problem 2019.11.12 2025.05.28 Literature Database
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16 BlockchainMachine Learning MethodComputational Problem 2019.09.16 2025.05.28 Literature Database
On the Hardness of Robust Classification Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2019-09-12 Learnability of Monotone CombinationsLoss FunctionComputational Problem 2019.09.12 2025.05.28 Literature Database