Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20 PoisoningPerformance EvaluationAdversarial Attack Methods 2020.09.10 2025.05.28 Literature Database
Membership Leakage in Label-Only Exposures Authors: Zheng Li, Yang Zhang | Published: 2020-07-30 | Updated: 2021-09-17 Membership InferencePerformance EvaluationAttack Method 2020.07.30 2025.05.28 Literature Database
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30 Performance EvaluationDeep LearningComputational Efficiency 2020.07.30 2025.05.28 Literature Database
A General Framework For Detecting Anomalous Inputs to DNN Classifiers Authors: Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee | Published: 2020-07-29 | Updated: 2021-06-17 Performance EvaluationAttack MethodDeep Learning 2020.07.29 2025.05.28 Literature Database
Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12 Performance EvaluationAdversarial ExampleComputational Efficiency 2020.07.28 2025.05.28 Literature Database
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15 Intrusion Detection SystemPerformance EvaluationComputational Efficiency 2020.07.27 2025.05.28 Literature Database
Evaluation of Federated Learning in Phishing Email Detection Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21 Privacy AssessmentPerformance EvaluationDeep Learning 2020.07.27 2025.05.28 Literature Database
Detecting malicious PDF using CNN Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02 Online Malware DetectionPerformance EvaluationDeep Learning 2020.07.24 2025.05.28 Literature Database
Provably Robust Adversarial Examples Authors: Dimitar I. Dimitrov, Gagandeep Singh, Timon Gehr, Martin Vechev | Published: 2020-07-23 | Updated: 2022-03-17 Performance EvaluationAdversarial ExampleDeep Learning 2020.07.23 2025.05.28 Literature Database
Hide-and-Seek Privacy Challenge Authors: James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, Mihaela van der Schaar | Published: 2020-07-23 | Updated: 2020-07-24 Privacy AssessmentPerformance EvaluationGenerative Model Characteristics 2020.07.23 2025.05.28 Literature Database