Robustness Evaluation

Robustness, Efficiency, or Privacy: Pick Two in Machine Learning

Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11
Byzantine Resilience
Privacy Protection Method
Robustness Evaluation

Rethinking Randomized Smoothing from the Perspective of Scalability

Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24
Scalability Analysis
Robustness Evaluation
Computational Efficiency

Rethinking Robustness of Model Attributions

Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian | Published: 2023-12-16
Robustness Evaluation
Watermark Robustness
Watermark Evaluation

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification

Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13
Graph Neural Network
Fingerprinting Method
Robustness Evaluation

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
Poisoning
Robustness Evaluation
Adversarial attack

Data-Free Hard-Label Robustness Stealing Attack

Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12
Watermarking
Robustness Evaluation
Watermark Evaluation

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System

Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06
Robustness Evaluation
Intrusion Detection System
Adversarial attack

Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More

Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15
Robustness Evaluation
Watermark Robustness
Watermark Evaluation

Rethinking PGD Attack: Is Sign Function Necessary?

Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21
Poisoning
Robustness Evaluation
Adversarial attack

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack