Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13 AlgorithmExplainability of Graph Machine LearningDefense Effectiveness Analysis 2020.05.13 2025.05.28 Literature Database
Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18 AlgorithmRobustness EvaluationFactors of Performance Degradation 2020.05.12 2025.05.28 Literature Database
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 AlgorithmAttack DetectionAdversarial Training 2020.05.11 2025.05.28 Literature Database
Cloud-based Federated Boosting for Mobile Crowdsensing Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09 AlgorithmCryptographyFederated Learning System 2020.05.09 2025.05.28 Literature Database
Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01 AlgorithmStability AssessmentExpression of Gratitude 2020.05.08 2025.05.28 Literature Database
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.28 Literature Database
Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06 AlgorithmRobustness Improvement MethodAdversarial Attack Detection 2020.05.06 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database