Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha | Published: 2020-09-11 Membership InferenceMembership Disclosure RiskAdversarial Attack Methods 2020.09.11 2025.05.28 Literature Database
Second Order Optimization for Adversarial Robustness and Interpretability Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10 Performance EvaluationAdversarial Attack MethodsDeep Learning Technology 2020.09.10 2025.05.28 Literature Database
Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20 PoisoningPerformance EvaluationAdversarial Attack Methods 2020.09.10 2025.05.28 Literature Database
Adversarial Attack on Large Scale Graph Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06 Graph TransformationAdversarial Attack MethodsStructural Attack 2020.09.08 2025.05.28 Literature Database
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07 Adversarial Attack MethodsMachine Learning MethodImage Processing 2020.09.07 2025.05.28 Literature Database
Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks Authors: Shankar A. Deka, Dušan M. Stipanović, Claire J. Tomlin | Published: 2020-09-07 Multi-Class ClassificationAdversarial ExampleAdversarial Attack Methods 2020.09.07 2025.05.28 Literature Database
Detection Defense Against Adversarial Attacks with Saliency Map Authors: Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang | Published: 2020-09-06 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.09.06 2025.05.28 Literature Database
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23 Model InversionAdversarial Attack MethodsFace Recognition 2020.08.23 2025.05.28 Literature Database
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28 Adversarial Attack MethodsOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17 Uncertainty AssessmentAdversarial Attack MethodsDeep Learning Method 2020.08.07 2025.05.28 Literature Database