Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17 WatermarkingData GenerationMembership Inference 2020.09.18 2025.05.28 Literature Database
Real-Time Anomaly Detection in Edge Streams Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25 DDoS AttackData GenerationAnomaly Detection Method 2020.09.17 2025.05.28 Literature Database
Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms Evaluation Authors: Wenhao Ding, Baiming Chen, Bo Li, Kim Ji Eun, Ding Zhao | Published: 2020-09-16 | Updated: 2020-12-26 Data GenerationPerformance Evaluation MetricsDeep Reinforcement Learning 2020.09.16 2025.05.28 Literature Database
Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30 Data GenerationSelection and Evaluation of Optimization AlgorithmsMachine Learning 2020.09.15 2025.05.28 Literature Database
Private data sharing between decentralized users through the privGAN architecture Authors: Jean-Francois Rajotte, Raymond T Ng | Published: 2020-09-14 Data GenerationPrivacy ProtectionEthical Considerations 2020.09.14 2025.05.28 Literature Database
MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models Authors: Yixi Xu, Sumit Mukherjee, Xiyang Liu, Shruti Tople, Rahul Dodhia, Juan Lavista Ferres | Published: 2020-09-11 | Updated: 2022-10-12 Data GenerationMembership Disclosure RiskEvaluation Method 2020.09.11 2025.05.28 Literature Database
Attribute Privacy: Framework and Mechanisms Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11 Data GenerationCryptographyMachine Learning Technology 2020.09.08 2025.05.28 Literature Database
MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27 Data GenerationText Generation MethodAdversarial attack 2020.09.01 2025.05.28 Literature Database
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31 Data GenerationModule ReconfigurationAuthor Identification Method 2020.08.31 2025.05.28 Literature Database
Imitation Privacy Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30 Data GenerationInformation Hiding TechniquesAdversarial attack 2020.08.30 2025.05.28 Literature Database