Performance Evaluation

Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training

Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12
Performance Evaluation
Adversarial Example
Computational Efficiency

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15
Intrusion Detection System
Performance Evaluation
Computational Efficiency

Evaluation of Federated Learning in Phishing Email Detection

Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21
Privacy Assessment
Performance Evaluation
Deep Learning

Detecting malicious PDF using CNN

Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02
Online Malware Detection
Performance Evaluation
Deep Learning

Provably Robust Adversarial Examples

Authors: Dimitar I. Dimitrov, Gagandeep Singh, Timon Gehr, Martin Vechev | Published: 2020-07-23 | Updated: 2022-03-17
Performance Evaluation
Adversarial Example
Deep Learning

Hide-and-Seek Privacy Challenge

Authors: James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, Mihaela van der Schaar | Published: 2020-07-23 | Updated: 2020-07-24
Privacy Assessment
Performance Evaluation
Generative Model Characteristics

Private Post-GAN Boosting

Authors: Marcel Neunhoeffer, Zhiwei Steven Wu, Cynthia Dwork | Published: 2020-07-23 | Updated: 2021-03-25
Game Theory
Privacy Assessment
Performance Evaluation

Scaling Polyhedral Neural Network Verification on GPUs

Authors: Christoph Müller, François Serre, Gagandeep Singh, Markus Püschel, Martin Vechev | Published: 2020-07-20 | Updated: 2021-05-18
Performance Evaluation
Deep Learning
Computational Efficiency

Learning perturbation sets for robust machine learning

Authors: Eric Wong, J. Zico Kolter | Published: 2020-07-16 | Updated: 2020-10-08
Performance Evaluation
Adversarial Perturbation Techniques
Generative Model Characteristics

Data Poisoning Attacks Against Federated Learning Systems

Authors: Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu | Published: 2020-07-16 | Updated: 2020-08-11
Poisoning
Performance Evaluation
Attack Method