性能評価

Fastened CROWN: Tightened Neural Network Robustness Certificates

Authors: Zhaoyang Lyu, Ching-Yun Ko, Zhifeng Kong, Ngai Wong, Dahua Lin, Luca Daniel | Published: 2019-12-02
性能評価
深層学習
連続的な線形関数

Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality

Authors: Pulkit Sharma, Farah E Shamout, David A Clifton | Published: 2019-12-01
プライバシー保護
分散学習
性能評価

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08
プライバシー保護
効率評価
性能評価

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26
性能評価
深層学習技術
画像特徴抽出

Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks

Authors: Alexander Levine, Soheil Feizi | Published: 2019-10-23
Wasserstein距離
性能評価
敵対的サンプル

Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms

Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29
対抗的学習
性能評価
敵対的移転性

GraphSAC: Detecting anomalies in large-scale graphs

Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21
グラフ表現学習
データ汚染検出
性能評価

Learning to Learn by Zeroth-Order Oracle

Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07
性能評価
損失項
最適化アルゴリズムの選択と評価

Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection

Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28
ネットワークトラフィック分析
性能評価
機械学習手法

Deep k-NN Defense against Clean-label Data Poisoning Attacks

Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13
バックドア攻撃
性能評価
毒データの検知