Gradient-based Data Subversion Attack Against Binary Classifiers Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31 Data Contamination DetectionPoisoningOptimization Methods 2021.05.31 2025.05.28 Literature Database
DeepMoM: Robust Deep Learning With Median-of-Means Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08 Data Contamination DetectionConvergence GuaranteeOptimization Methods 2021.05.28 2025.05.28 Literature Database
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 PoisoningOptimization MethodsVulnerability Assessment Method 2021.05.23 2025.05.28 Literature Database
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 Privacy Protection MethodInformation-Theoretic EvaluationOptimization Methods 2021.05.21 2025.05.28 Literature Database
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05 Data Management SystemPrivacy ProtectionOptimization Methods 2021.05.05 2025.05.28 Literature Database
Statistical inference for individual fairness Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30 Risk Assessment MethodFairness evaluationOptimization Methods 2021.03.30 2025.05.28 Literature Database
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 Measurement of MemorizationEncryption MethodOptimization Methods 2021.03.30 2025.05.28 Literature Database
Graph Unlearning Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16 Data Management SystemConvergence PropertyOptimization Methods 2021.03.27 2025.05.28 Literature Database
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25 Vulnerability of Adversarial ExamplesOptimization MethodsWireless Channel Detection 2021.03.25 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database