Adversarial Reprogramming of Neural Networks Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29 Certified RobustnessAdversarial ExampleWatermark 2018.06.28 2025.05.28 Literature Database
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10 Certified RobustnessAdversarial attackWatermark 2018.04.10 2025.05.28 Literature Database
Robust Decentralized Learning Using ADMM with Unreliable Agents Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21 Robustness Improvement MethodConvergence PropertyWatermark 2017.10.14 2025.05.28 Literature Database
CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09 Convergence PropertyInterpretation MethodWatermark 2017.10.09 2025.05.28 Literature Database
Computation on Encrypted Data using Data Flow Authentication Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01 Information SecurityInformation Flow ControlWatermark 2017.10.01 2025.05.28 Literature Database