文献データベース

Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network

Authors: Nathan Borggren, Hyoung-yoon Kim, Lihan Yao, Gary Koplik | Published: 2020-01-12
データ生成
データ管理システム
機械学習

Campfire: Compressible, Regularization-Free, Structured Sparse Training for Hardware Accelerators

Authors: Noah Gamboa, Kais Kudrolli, Anand Dhoot, Ardavan Pedram | Published: 2020-01-09 | Updated: 2020-01-13
プルーニング手法
ロバスト性に関する評価
深層学習手法

Real-Time Edge Intelligence in the Making: A Collaborative Learning Framework via Federated Meta-Learning

Authors: Sen Lin, Guang Yang, Junshan Zhang | Published: 2020-01-09 | Updated: 2020-05-08
収束分析
機械学習
通信効率

Secure multiparty computations in floating-point arithmetic

Authors: Chuan Guo, Awni Hannun, Brian Knott, Laurens van der Maaten, Mark Tygert, Ruiyu Zhu | Published: 2020-01-09
多項式近似
機械学習
線形モデル

Explainable Deep Convolutional Candlestick Learner

Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29
ローソク足パターン
敵対的摂動手法
機械学習の応用

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08
プロンプトインジェクション
メンバーシップ推論
敵対的学習

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14
ロバスト性に関する評価
最適化手法
深層学習

Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring

Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07
クラスタリング手法
ロバスト性に関する評価
敵対的学習

WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07
ロバスト性に関する評価
悪意のあるクライアント
敵対的学習

Towards a secure behavior modeling for IoT networks using Blockchain

Authors: Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed | Published: 2020-01-06
IoTセキュリティ
Trusted Capable Model Environments
深層学習