Robustness, Efficiency, or Privacy: Pick Two in Machine Learning Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11 Byzantine ResiliencePrivacy Protection MethodRobustness Evaluation 2023.12.22 2025.05.27 Literature Database
Rethinking Randomized Smoothing from the Perspective of Scalability Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24 Scalability AnalysisRobustness EvaluationComputational Efficiency 2023.12.19 2025.05.27 Literature Database
Rethinking Robustness of Model Attributions Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian | Published: 2023-12-16 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.16 2025.05.27 Literature Database
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13 Graph Neural NetworkFingerprinting MethodRobustness Evaluation 2023.12.13 2025.05.28 Literature Database
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 PoisoningRobustness EvaluationAdversarial attack 2023.12.11 2025.05.28 Literature Database
Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 WatermarkingRobustness EvaluationWatermark Evaluation 2023.12.10 2025.05.28 Literature Database
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06 Robustness EvaluationIntrusion Detection SystemAdversarial attack 2023.12.06 2025.05.28 Literature Database
Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.05 2025.05.28 Literature Database
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 PoisoningRobustness EvaluationAdversarial attack 2023.12.03 2025.05.28 Literature Database
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30 WatermarkingRobustness EvaluationAdversarial attack 2023.11.30 2025.05.28 Literature Database