Descent-to-Delete: Gradient-Based Methods for Machine Unlearning

Authors: Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi | Published: 2020-07-06

Certifying Decision Trees Against Evasion Attacks by Program Analysis

Authors: Stefano Calzavara, Pietro Ferrara, Claudio Lucchese | Published: 2020-07-06

Black-box Adversarial Example Generation with Normalizing Flows

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-06

On Data Augmentation and Adversarial Risk: An Empirical Analysis

Authors: Hamid Eghbal-zadeh, Khaled Koutini, Paul Primus, Verena Haunschmid, Michal Lewandowski, Werner Zellinger, Bernhard A. Moser, Gerhard Widmer | Published: 2020-07-06

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

Authors: Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2020-07-05 | Updated: 2021-03-13

Relationship between manifold smoothness and adversarial vulnerability in deep learning with local errors

Authors: Zijian Jiang, Jianwen Zhou, Haiping Huang | Published: 2020-07-04 | Updated: 2020-12-23

PPaaS: Privacy Preservation as a Service

Authors: Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe | Published: 2020-07-04 | Updated: 2021-04-21

Harnessing Wireless Channels for Scalable and Privacy-Preserving Federated Learning

Authors: Anis Elgabli, Jihong Park, Chaouki Ben Issaid, Mehdi Bennis | Published: 2020-07-03 | Updated: 2020-11-17

Trace-Norm Adversarial Examples

Authors: Ehsan Kazemi, Thomas Kerdreux, Liqiang Wang | Published: 2020-07-02

Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment

Authors: Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia | Published: 2020-07-02