Algorithm

Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness

Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07
Algorithm
Machine Learning Algorithm
Machine Learning Method

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13
Algorithm
Explainability of Graph Machine Learning
Defense Effectiveness Analysis

Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks

Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18
Algorithm
Robustness Evaluation
Factors of Performance Degradation

Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data

Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10
Algorithm
Attack Detection
Adversarial Training

Cloud-based Federated Boosting for Mobile Crowdsensing

Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09
Algorithm
Cryptography
Federated Learning System

Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm

Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01
Algorithm
Stability Assessment
Expression of Gratitude

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06
Algorithm
Robustness Improvement Method
Adversarial Attack Detection

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29
Algorithm
Poisoning
evaluation metrics