Neuron Shapley: Discovering the Responsible Neurons Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13 Performance EvaluationFeature Importance AnalysisVulnerability Prediction 2020.02.23 2025.05.28 Literature Database
Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22 Performance EvaluationAdversarial TrainingDefense Method 2020.02.22 2025.05.28 Literature Database
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2020-02-22 | Updated: 2020-02-27 Performance EvaluationAdversarial ExampleAdversarial Training 2020.02.22 2025.05.28 Literature Database
TensorShield: Tensor-based Defense Against Adversarial Attacks on Images Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18 Performance EvaluationAdversarial ExampleDefense Method 2020.02.18 2025.05.28 Literature Database
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05 Privacy Enhancing ProtocolDiscussion on Protocol Vulnerabilities and Attack ScenariosPerformance Evaluation 2019.12.05 2025.05.28 Literature Database
FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique | Published: 2019-12-03 | Updated: 2020-05-14 Performance EvaluationMachine LearningDeep Learning 2019.12.03 2025.05.28 Literature Database
Deep Probabilistic Models to Detect Data Poisoning Attacks Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03 Backdoor AttackPoisoning AttackPerformance Evaluation 2019.12.03 2025.05.28 Literature Database
A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay | Published: 2019-12-02 Performance EvaluationMachine Learning MethodCrime Detection 2019.12.02 2025.05.28 Literature Database
Fastened CROWN: Tightened Neural Network Robustness Certificates Authors: Zhaoyang Lyu, Ching-Yun Ko, Zhifeng Kong, Ngai Wong, Dahua Lin, Luca Daniel | Published: 2019-12-02 Performance EvaluationDeep LearningContinuous Linear Function 2019.12.02 2025.05.28 Literature Database
Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality Authors: Pulkit Sharma, Farah E Shamout, David A Clifton | Published: 2019-12-01 Privacy ProtectionDistributed LearningPerformance Evaluation 2019.12.01 2025.05.28 Literature Database