Data Generation

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17
Watermarking
Data Generation
Membership Inference

Real-Time Anomaly Detection in Edge Streams

Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25
DDoS Attack
Data Generation
Anomaly Detection Method

Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms Evaluation

Authors: Wenhao Ding, Baiming Chen, Bo Li, Kim Ji Eun, Ding Zhao | Published: 2020-09-16 | Updated: 2020-12-26
Data Generation
Performance Evaluation Metrics
Deep Reinforcement Learning

Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup

Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30
Data Generation
Selection and Evaluation of Optimization Algorithms
Machine Learning

Private data sharing between decentralized users through the privGAN architecture

Authors: Jean-Francois Rajotte, Raymond T Ng | Published: 2020-09-14
Data Generation
Privacy Protection
Ethical Considerations

MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models

Authors: Yixi Xu, Sumit Mukherjee, Xiyang Liu, Shruti Tople, Rahul Dodhia, Juan Lavista Ferres | Published: 2020-09-11 | Updated: 2022-10-12
Data Generation
Membership Disclosure Risk
Evaluation Method

Attribute Privacy: Framework and Mechanisms

Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11
Data Generation
Cryptography
Machine Learning Technology

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27
Data Generation
Text Generation Method
Adversarial attack

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31
Data Generation
Module Reconfiguration
Author Identification Method

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30
Data Generation
Information Hiding Techniques
Adversarial attack