Treant: Training Evasion-Aware Decision Trees

Authors: Stefano Calzavara, Claudio Lucchese, Gabriele Tolomei, Seyum Assefa Abebe, Salvatore Orlando | Published: 2019-07-02 | Updated: 2019-07-03

Accurate, reliable and fast robustness evaluation

Authors: Wieland Brendel, Jonas Rauber, Matthias Kümmerer, Ivan Ustyuzhaninov, Matthias Bethge | Published: 2019-07-01 | Updated: 2019-12-12

Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network”

Authors: Roland S. Zimmermann | Published: 2019-07-01

System Misuse Detection via Informed Behavior Clustering and Modeling

Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28

On the Privacy Risks of Model Explanations

Authors: Reza Shokri, Martin Strobel, Yair Zick | Published: 2019-06-29 | Updated: 2021-02-05

DP-LSSGD: A Stochastic Optimization Method to Lift the Utility in Privacy-Preserving ERM

Authors: Bao Wang, Quanquan Gu, March Boedihardjo, Farzin Barekat, Stanley J. Osher | Published: 2019-06-28 | Updated: 2019-12-07

Secure Summation via Subset Sums: A New Primitive for Privacy-Preserving Distributed Machine Learning

Authors: Valentin Hartmann, Robert West | Published: 2019-06-27 | Updated: 2023-06-19

Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference

Authors: Klas Leino, Matt Fredrikson | Published: 2019-06-27 | Updated: 2020-06-24

Adversarial Robustness via Label-Smoothing

Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15