Algorithm

On the Tightness of Semidefinite Relaxations for Certifying Robustness to Adversarial Examples

Authors: Richard Y. Zhang | Published: 2020-06-11 | Updated: 2020-10-26
Algorithm
Safety Characteristics
Fundamentals of Machine Learning

Interpolation between Residual and Non-Residual Networks

Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16
Algorithm
Performance Evaluation
Improvement of Learning

Low Distortion Block-Resampling with Spatially Stochastic Networks

Authors: Sarah Jane Hong, Martin Arjovsky, Darryl Barnhart, Ian Thompson | Published: 2020-06-09 | Updated: 2020-12-10
Algorithm
Improvement of Learning
Challenges of Generative Models

Approximating Lipschitz continuous functions with GroupSort neural networks

Authors: Ugo Tanielian, Maxime Sangnier, Gerard Biau | Published: 2020-06-09 | Updated: 2021-02-08
Algorithm
Mesoscopic Linearity
Fundamentals of Machine Learning

Simultaneous Perturbation Stochastic Approximation for Few-Shot Learning

Authors: Andrei Boiarov, Oleg Granichin, Olga Granichina | Published: 2020-06-09
Few-Shot Learning
Algorithm
Improvement of Learning

Stealing Deep Reinforcement Learning Models for Fun and Profit

Authors: Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu | Published: 2020-06-09 | Updated: 2020-12-22
Algorithm
Improvement of Learning
Attack Type

Adversarial Feature Desensitization

Authors: Pouya Bashivan, Reza Bayat, Adam Ibrahim, Kartik Ahuja, Mojtaba Faramarzi, Touraj Laleh, Blake Aaron Richards, Irina Rish | Published: 2020-06-08 | Updated: 2022-01-04
Algorithm
Adversarial Example
Adversarial Example Detection

ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing

Authors: Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach | Published: 2020-06-08 | Updated: 2021-10-28
Algorithm
Privacy Assessment
Federated Learning System

A Multi-step and Resilient Predictive Q-learning Algorithm for IoT with Human Operators in the Loop: A Case Study in Water Supply Networks

Authors: Maria Grammatopoulou, Aris Kanellopoulos, Kyriakos G. ~Vamvoudakis, Nathan Lau | Published: 2020-06-06
Algorithm
Risk Management
Improvement of Learning

mFI-PSO: A Flexible and Effective Method in Adversarial Image Generation for Deep Neural Networks

Authors: Hai Shu, Ronghua Shi, Qiran Jia, Hongtu Zhu, Ziqi Chen | Published: 2020-06-05 | Updated: 2022-05-08
Algorithm
Attack Type
Adversarial Attack Detection