Enhancing Certified Robustness via Smoothed Weighted Ensembling Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23 AlgorithmGeneralization PerformanceResearch Methodology 2020.05.19 2025.05.28 Literature Database
A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database
Universal Adversarial Perturbations: A Survey Authors: Ashutosh Chaubey, Nikhil Agrawal, Kavya Barnwal, Keerat K. Guliani, Pramod Mehta | Published: 2020-05-16 AlgorithmLoss FunctionAdversarial Example 2020.05.16 2025.05.28 Literature Database
Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data Authors: Deepesh Data, Suhas Diggavi | Published: 2020-05-16 AlgorithmLoss FunctionMachine Learning Algorithm 2020.05.16 2025.05.28 Literature Database
Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13 AlgorithmExplainability of Graph Machine LearningDefense Effectiveness Analysis 2020.05.13 2025.05.28 Literature Database
Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18 AlgorithmRobustness EvaluationFactors of Performance Degradation 2020.05.12 2025.05.28 Literature Database
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10 AlgorithmAttack DetectionAdversarial Training 2020.05.11 2025.05.28 Literature Database
Cloud-based Federated Boosting for Mobile Crowdsensing Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09 AlgorithmCryptographyFederated Learning System 2020.05.09 2025.05.28 Literature Database
Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01 AlgorithmStability AssessmentExpression of Gratitude 2020.05.08 2025.05.28 Literature Database