Poisoning the Search Space in Neural Architecture Search

Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28

On the (Un-)Avoidability of Adversarial Examples

Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24

Teacher Model Fingerprinting Attacks Against Transfer Learning

Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23

Machine learning for risk assessment in gender-based crime

Authors: Ángel González-Prieto, Antonio Brú, Juan Carlos Nuño, José Luis González-Álvarez | Published: 2021-06-22

Outlier Detection and Spatial Analysis Algorithms

Authors: Jacob John | Published: 2021-06-20

Residual Error: a New Performance Measure for Adversarial Robustness

Authors: Hossein Aboutalebi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger, Alexander Wong | Published: 2021-06-18

Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning

Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07

Longitudinal Compliance Analysis of Android Applications with Privacy Policies

Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28

Accumulative Poisoning Attacks on Real-time Data

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11