It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17 Data CollectionModel Performance EvaluationFundamentals of Machine Learning 2023.03.17 2025.05.28 Literature Database
Automated Machine Learning for Deep Learning based Malware Detection Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-03-03 | Updated: 2023-11-03 Hyperparameter TuningMalware DetectionModel Performance Evaluation 2023.03.03 2025.05.28 Literature Database
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15 Data CollectionModel Performance EvaluationVulnerability Prediction 2023.02.27 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20 DNN IP Protection MethodPoisoningModel Performance Evaluation 2023.02.21 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database
Continuous Learning for Android Malware Detection Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14 Online LearningPoisoningModel Performance Evaluation 2023.02.08 2025.05.28 Literature Database
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.03 2025.05.28 Literature Database