Watermarking

A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization

Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11
Watermarking
Model Performance Evaluation
Signal Analysis

A flow-based IDS using Machine Learning in eBPF

Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04
ML-Based IDS
Watermarking
Attack Method

ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves

Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15
Watermarking
Data Protection Method
Model Performance Evaluation

SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel

Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29
Watermarking
Malware Detection Method
Hierarchical Classification Methods

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification

Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03
Watermarking
Data-Driven Vulnerability Assessment
Trust Evaluation Module

Certifiably Robust Variational Autoencoders

Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23
Watermarking
Data Generation
Model Architecture

Perceptually Constrained Adversarial Attacks

Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14
Watermarking
Attack Method
Adversarial Training

Private Prediction Sets

Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03
Watermarking
Data Protection Method
Difficulty Calibration

Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack

Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01
Watermarking
Data Protection Method
Model Performance Evaluation

Efficient Certified Defenses Against Patch Attacks on Image Classifiers

Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08
Watermarking
Model Architecture
Adversarial Training