Performance Evaluation

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24
Performance Evaluation
Deep Learning Method
Vulnerability detection

GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators

Authors: Dingfan Chen, Tribhuvanesh Orekondy, Mario Fritz | Published: 2020-06-15 | Updated: 2021-03-15
Algorithm Design
Performance Evaluation
Privacy Protection in Machine Learning

Privacy-Preserving Technology to Help Millions of People: Federated Prediction Model for Stroke Prevention

Authors: Ce Ju, Ruihui Zhao, Jichao Sun, Xiguang Wei, Bo Zhao, Yang Liu, Hongshan Li, Tianjian Chen, Xinwei Zhang, Dashan Gao, Ben Tan, Han Yu, Chuning He, Yuan Jin | Published: 2020-06-15 | Updated: 2020-12-15
Privacy Design Principles
Performance Evaluation
Privacy Protection in Machine Learning

FMix: Enhancing Mixed Sample Data Augmentation

Authors: Ethan Harris, Antonia Marcu, Matthew Painter, Mahesan Niranjan, Adam Prügel-Bennett, Jonathon Hare | Published: 2020-02-27 | Updated: 2021-02-28
Training Method
Robustness Evaluation
Performance Evaluation

Revisiting Ensembles in an Adversarial Context: Improving Natural Accuracy

Authors: Aditya Saligrama, Guillaume Leclerc | Published: 2020-02-26
Robustness Evaluation
Performance Evaluation
Adversarial Training

IoT Device Identification Using Deep Learning

Authors: Jaidip Kotak, Yuval Elovici | Published: 2020-02-25
Data Management System
Performance Evaluation
Machine Learning Method

Neuron Shapley: Discovering the Responsible Neurons

Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13
Performance Evaluation
Feature Importance Analysis
Vulnerability Prediction

Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks

Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22
Performance Evaluation
Adversarial Training
Defense Method

Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2020-02-22 | Updated: 2020-02-27
Performance Evaluation
Adversarial Example
Adversarial Training

TensorShield: Tensor-based Defense Against Adversarial Attacks on Images

Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18
Performance Evaluation
Adversarial Example
Defense Method