Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06 AlgorithmData GenerationPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Mobile authentication of copy detection patterns: how critical is to know fakes? Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 Data GenerationPerformance EvaluationIntellectual Property Protection 2021.10.05 2025.05.28 Literature Database
An energy-based model for neuro-symbolic reasoning on knowledge graphs Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04 AlgorithmPerformance EvaluationMachine Learning Application 2021.10.04 2025.05.28 Literature Database
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 Data LeakageFingerprinting MethodPerformance Evaluation 2021.10.04 2025.05.28 Literature Database
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30 Data Extraction and AnalysisData GenerationPerformance Evaluation 2021.09.30 2025.05.28 Literature Database
Fairness-Driven Private Collaborative Machine Learning Authors: Dana Pessach, Tamir Tassa, Erez Shmueli | Published: 2021-09-29 Data Privacy AssessmentPerformance EvaluationFederated Learning 2021.09.29 2025.05.28 Literature Database
Unrolling SGD: Understanding Factors Influencing Machine Unlearning Authors: Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-09-27 | Updated: 2022-03-02 AlgorithmPerformance EvaluationRegularization 2021.09.27 2025.05.28 Literature Database
Distributionally Robust Multiclass Classification and Applications in Deep Image Classifiers Authors: Ruidi Chen, Boran Hao, Ioannis Paschalidis | Published: 2021-09-27 | Updated: 2023-03-25 RobustnessPerformance EvaluationMachine Learning Application 2021.09.27 2025.05.28 Literature Database
MixNN: Protection of Federated Learning Against Inference Attacks by Mixing Neural Network Layers Authors: Antoine Boutet, Thomas Lebrun, Jan Aalmoes, Adrien Baud | Published: 2021-09-26 Privacy Risk ManagementPerformance EvaluationFederated Learning 2021.09.26 2025.05.28 Literature Database
Opacus: User-Friendly Differential Privacy Library in PyTorch Authors: Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, Ilya Mironov | Published: 2021-09-25 | Updated: 2022-08-22 DP-SGDLibrary ClassificationPerformance Evaluation 2021.09.25 2025.05.28 Literature Database