Decision Explanation and Feature Importance for Invertible Networks

Authors: Juntang Zhuang, Nicha C. Dvornek, Xiaoxiao Li, Junlin Yang, James S. Duncan | Published: 2019-09-30 | Updated: 2019-10-15

Deep k-NN Defense against Clean-label Data Poisoning Attacks

Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13

Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks

Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2019-09-27 | Updated: 2020-07-06

Alleviating Privacy Attacks via Causal Learning

Authors: Shruti Tople, Amit Sharma, Aditya Nori | Published: 2019-09-27 | Updated: 2020-07-17

A Matrix Factorization Model for Hellinger-based Trust Management in Social Internet of Things

Authors: Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar, H. Eugene Stanley | Published: 2019-09-26 | Updated: 2021-03-02

Lower Bounds on Adversarial Robustness from Optimal Transport

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30

GAMIN: An Adversarial Approach to Black-Box Model Inversion

Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26

Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection

Authors: Nilesh A. Ahuja, Ibrahima Ndiour, Trushant Kalyanpur, Omesh Tickoo | Published: 2019-09-25

Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks

Authors: Tianyu Pang, Kun Xu, Jun Zhu | Published: 2019-09-25 | Updated: 2020-02-20

Matrix Sketching for Secure Collaborative Machine Learning

Authors: Mengjiao Zhang, Shusen Wang | Published: 2019-09-24 | Updated: 2021-07-08