文献データベース

Zeroth-Order Stochastic Alternating Direction Method of Multipliers for Nonconvex Nonsmooth Optimization

Authors: Feihu Huang, Shangqian Gao, Songcan Chen, Heng Huang | Published: 2019-05-29 | Updated: 2019-07-30
収束性分析
最適化手法
機械学習のプライバシー保護

Defending Against Neural Fake News

Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11
AIによる出力の識別
サイバー脅威
深層学習手法

Automatically Dismantling Online Dating Fraud

Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty | Published: 2019-05-29 | Updated: 2019-05-30
データセット分析
データ収集手法
プロフィール特性分析

Misleading Authorship Attribution of Source Code using Adversarial Learning

Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31
攻撃の評価
敵対的攻撃
著者帰属手法

CopyCAT: Taking Control of Neural Policies with Constant Attacks

Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21
効果的な摂動手法
敵対的攻撃
深層学習

A Topology Layer for Machine Learning

Authors: Rickard Brüel-Gabrielsson, Bradley J. Nelson, Anjan Dwaraknath, Primoz Skraba, Leonidas J. Guibas, Gunnar Carlsson | Published: 2019-05-29 | Updated: 2020-04-24
トポロジー解析
フィルトレーション手法
正則化

Accelerating Monte Carlo Bayesian Inference via Approximating Predictive Uncertainty over Simplex

Authors: Yufei Cui, Wuguannan Yao, Qiao Li, Antoni B. Chan, Chun Jason Xue | Published: 2019-05-29 | Updated: 2019-09-26
不確実性の定量化
生成モデル

An Investigation of Data Poisoning Defenses for Online Learning

Authors: Yizhen Wang, Somesh Jha, Kamalika Chaudhuri | Published: 2019-05-28 | Updated: 2020-02-19
バックドア攻撃
ポイズニング
攻撃の分類

Certifiably Robust Interpretation in Deep Learning

Authors: Alexander Levine, Sahil Singla, Soheil Feizi | Published: 2019-05-28 | Updated: 2019-10-17
XAI(説明可能なAI)
ポイズニング
モデル評価

Differential Privacy Has Disparate Impact on Model Accuracy

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2019-05-28 | Updated: 2019-10-27
プライバシー保護
プライバシー保護手法
モデル評価