Evaluation Method

Malware Classification Using Deep Boosted Learning

Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan | Published: 2021-07-08
PE Malware Classification
Deep Transfer Learning
Evaluation Method

Bayesian Attention Belief Networks

Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09
Natural Language Processing
Computational Efficiency
Evaluation Method

On Ensemble Learning

Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07
Performance Evaluation
Machine Learning Application
Evaluation Method

Risk Management Framework for Machine Learning Security

Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09
Cost Efficiency
Data Protection Method
Evaluation Method

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29
Adversarial Example
Certificate Ratio
Evaluation Method

Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?

Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11
Adversarial Example
Challenges of Generative Models
Evaluation Method

Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26
Membership Inference
Information Embedding Attack
Evaluation Method

MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models

Authors: Yixi Xu, Sumit Mukherjee, Xiyang Liu, Shruti Tople, Rahul Dodhia, Juan Lavista Ferres | Published: 2020-09-11 | Updated: 2022-10-12
Data Generation
Membership Disclosure Risk
Evaluation Method

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method

Privacy-preserving feature selection: A survey and proposing a new set of protocols

Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17
Privacy-Preserving Data Mining
Evaluation Method
Watermark Evaluation