Performance Evaluation

Adversarial Self-Supervised Contrastive Learning

Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26
Performance Evaluation
Poisoning
Adversarial Attack Detection

Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02
Backdoor Attack
Performance Evaluation
Attack Scenario Analysis

Interpolation between Residual and Non-Residual Networks

Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16
Algorithm
Performance Evaluation
Improvement of Learning

AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference

Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15
Performance Evaluation
Privacy Assessment
Encryption Method

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28
Performance Evaluation
Privacy Assessment
Machine Learning

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23
Performance Evaluation
Phishing Detection
Poisoning

Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks

Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23
Data Preprocessing
Performance Evaluation
Classification Pattern Analysis