How to beat a Bayesian adversary Authors: Zihan Ding, Kexin Jin, Jonas Latz, Chenguang Liu | Published: 2024-07-11 2024.07.11 2025.04.03 文献データベース
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 2024.07.11 文献データベース
Explainable Differential Privacy-Hyperdimensional Computing for Balancing Privacy and Transparency in Additive Manufacturing Monitoring Authors: Fardin Jalil Piran, Prathyush P. Poduval, Hamza Errahmouni Barkam, Mohsen Imani, Farhad Imani | Published: 2024-07-09 | Updated: 2025-03-17 2024.07.09 2025.04.03 文献データベース
Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11 2024.07.05 2025.04.03 文献データベース
A Geometric Framework for Adversarial Vulnerability in Machine Learning Authors: Brian Bell | Published: 2024-07-03 2024.07.03 2025.04.03 文献データベース
MALT Powers Up Adversarial Attacks Authors: Odelia Melamed, Gilad Yehudai, Adi Shamir | Published: 2024-07-02 2024.07.02 2025.04.03 文献データベース
Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 2024.07.02 2025.04.03 文献データベース
On Discrete Prompt Optimization for Diffusion Models Authors: Ruochen Wang, Ting Liu, Cho-Jui Hsieh, Boqing Gong | Published: 2024-06-27 2024.06.27 2025.04.03 文献データベース
Diffusion-based Adversarial Purification for Intrusion Detection Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25 2024.06.25 2025.04.03 文献データベース
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 2024.06.25 2025.04.03 文献データベース