Differentially Private Federated Learning with Laplacian Smoothing

Authors: Zhicong Liang, Bao Wang, Quanquan Gu, Stanley Osher, Yuan Yao | Published: 2020-05-01 | Updated: 2021-09-10

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14

Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness

Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29

Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10

Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach

Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28

Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks

Authors: Pranjal Awasthi, Natalie Frank, Mehryar Mohri | Published: 2020-04-28

Private Dataset Generation Using Privacy Preserving Collaborative Learning

Authors: Amit Chaulwar | Published: 2020-04-28

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29