Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud

Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15

MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking

Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30

Adversarial Model Extraction on Graph Neural Networks

Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16

Constructing a provably adversarially-robust classifier from a high accuracy one

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2019-12-16

DAmageNet: A Universal Adversarial Dataset

Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16

Pseudo Random Number Generation: a Reinforcement Learning approach

Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15

Artificial Intelligence Techniques for Security Vulnerability Prevention

Authors: Steve Kommrusch | Published: 2019-12-14

Private Federated Learning with Domain Adaptation

Authors: Daniel Peterson, Pallika Kanani, Virendra J. Marathe | Published: 2019-12-13

Potential adversarial samples for white-box attacks

Authors: Amir Nazemi, Paul Fieguth | Published: 2019-12-13

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30