最適化問題

Hijack Vertical Federated Learning Models As One Party

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16
敵対的サンプル
最適化問題
未ターゲット毒性攻撃

Tight Certification of Adversarially Trained Neural Networks via Nonconvex Low-Rank Semidefinite Relaxations

Authors: Hong-Ming Chiu, Richard Y. Zhang | Published: 2022-11-30 | Updated: 2023-06-14
ウォーターマーキング
最適化問題
最適化手法

Traditional Classification Neural Networks are Good Generators: They are Competitive with DDPMs and GANs

Authors: Guangrun Wang, Philip H. S. Torr | Published: 2022-11-27 | Updated: 2022-12-08
ウォーターマーキング
最適化問題
最適化手法

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29
報酬メカニズム設計
最適化問題
機械学習技術

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning

Authors: Anshuka Rangi, Haifeng Xu, Long Tran-Thanh, Massimo Franceschetti | Published: 2022-08-29
サイバー攻撃
報酬メカニズム設計
最適化問題

Best Subset Selection with Efficient Primal-Dual Algorithm

Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05
アルゴリズム設計
最適化問題
特徴選択手法

Investigating Positive and Negative Qualities of Human-in-the-Loop Optimization for Designing Interaction Techniques

Authors: Liwei Chan, Yi-Chi Liao, George B. Mo, John J. Dudley, Chun-Lien Cheng, Per Ola Kristensson, Antti Oulasvirta | Published: 2022-04-15
ヒューマンインザループ
ベイズ最適化
最適化問題

Optimal Accounting of Differential Privacy via Characteristic Function

Authors: Yuqing Zhu, Jinshuo Dong, Yu-Xiang Wang | Published: 2021-06-16 | Updated: 2022-05-31
プライバシー保護技術
収束性分析
最適化問題

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal | Published: 2021-05-09 | Updated: 2021-07-23
敵対的攻撃手法
最適化問題
深層学習手法

Encrypted Distributed Lasso for Sparse Data Predictive Control

Authors: Andreea B. Alexandru, Anastasios Tsiamis, George J. Pappas | Published: 2021-04-23
プライバシー保護
暗号化技術
最適化問題