Partial sensitivity analysis in differential privacy Authors: Tamara T. Mueller, Alexander Ziller, Dmitrii Usynin, Moritz Knolle, Friederike Jungmann, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2021-11-28 Data Privacy AssessmentPrivacy Risk ManagementFeature Importance Analysis 2021.09.22 2025.05.28 Literature Database
DualNet: Locate Then Detect Effective Payload with Deep Attention Network Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23 PoisoningMachine Learning MethodFeature Importance Analysis 2020.10.23 2025.05.28 Literature Database
Tight Second-Order Certificates for Randomized Smoothing Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15 Optimization MethodsFeature Importance AnalysisCertificate Ratio Analysis 2020.10.20 2025.05.28 Literature Database
Correlated Differential Privacy: Feature Selection in Machine Learning Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07 Data Protection MethodData Selection StrategyFeature Importance Analysis 2020.10.07 2025.05.28 Literature Database
Feature importance in mobile malware detection Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28 Dataset AnalysisMalware Detection MethodFeature Importance Analysis 2020.07.27 2025.05.28 Literature Database
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain Authors: Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2020-07-05 | Updated: 2021-03-13 Adversarial ExampleAdversarial LearningFeature Importance Analysis 2020.07.05 2025.05.28 Literature Database
Smoothed Geometry for Robust Attribution Authors: Zifan Wang, Haofan Wang, Shakul Ramkumar, Matt Fredrikson, Piotr Mardziel, Anupam Datta | Published: 2020-06-11 | Updated: 2020-10-22 Attack TypeFeature Importance AnalysisInterpretation Method 2020.06.11 2025.05.28 Literature Database
Evaluations and Methods for Explanation through Robustness Analysis Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08 Future ResearchFeature Importance AnalysisInterpretation Method 2020.05.31 2025.05.28 Literature Database
Neuron Shapley: Discovering the Responsible Neurons Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13 Performance EvaluationFeature Importance AnalysisVulnerability Prediction 2020.02.23 2025.05.28 Literature Database
Recovering Localized Adversarial Attacks Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21 PoisoningAdversarial LearningFeature Importance Analysis 2019.10.21 2025.05.28 Literature Database