Adversarial Immunization for Certifiable Robustness on Graphs Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25 Graph TransformationPoisoningComputational Complexity 2020.07.19 2025.05.28 Literature Database
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16 Adversarial ExampleAdversarial LearningComputational Complexity 2020.01.16 2025.05.28 Literature Database
Algorithmic Probability-guided Supervised Machine Learning on Non-differentiable Spaces Authors: Santiago Hernández-Orozco, Hector Zenil, Jürgen Riedel, Adam Uccello, Narsis A. Kiani, Jesper Tegnér | Published: 2019-10-07 | Updated: 2019-10-08 Machine Learning AlgorithmComputational ComplexityDesign Optimization Methods 2019.10.07 2025.05.28 Literature Database
A Matrix Factorization Model for Hellinger-based Trust Management in Social Internet of Things Authors: Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar, H. Eugene Stanley | Published: 2019-09-26 | Updated: 2021-03-02 Signal AnalysisExperimental ValidationComputational Complexity 2019.09.26 2025.05.28 Literature Database
Non-Interactive Private Decision Tree Evaluation Authors: Anselme Tueno, Yordan Boev, Florian Kerschbaum | Published: 2019-09-18 Privacy Protection MechanismCryptographyComputational Complexity 2019.09.18 2025.05.28 Literature Database
Interpretable Encrypted Searchable Neural Networks Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14 Privacy Enhancing TechnologyCryptographyComputational Complexity 2019.08.14 2025.05.28 Literature Database
On Defending Against Label Flipping Attacks on Malware Detection Systems Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16 PoisoningAdversarial Attack MethodsComputational Complexity 2019.08.13 2025.05.28 Literature Database