Showing 401–420 of 468 results
/ Date/ Name
Apr 1, 2020MetaPoison: Practical General-purpose Clean-label Data PoisoningMar 24, 2020Learn to Forget: Machine Unlearning via Neuron MaskingMar 1, 2020Understanding the Intrinsic Robustness of Image Distributions using Conditional Generative ModelsFeb 11, 2020Privacy-preserving collaborative machine learning on genomic data using TensorFlowJan 26, 2020AI-Powered GUI Attack and Its Defensive MethodsJan 18, 2020Ownership preserving AI Market Places using BlockchainJan 8, 2020To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text ClassifiersDec 17, 2019Analyzing Information Leakage of Updates to Natural Language ModelsDec 5, 2019An Empirical Study on the Intrinsic Privacy of SGDNov 19, 2019Sieving Fake News From Genuine: A SynopsisNov 8, 2019Adversarial Attacks on GMM i-vector based Speaker Verification SystemsNov 5, 2019ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speechOct 31, 2019Certifiable Robustness to Graph PerturbationsOct 10, 2019A New Cryptosystem Based on Positive BraidsOct 2, 2019Coded Merkle Tree: Solving Data Availability Attacks in BlockchainsSep 9, 2019A New Analysis of Differential Privacy's Generalization GuaranteesJul 21, 2019LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering InfrastructureJul 12, 2019Stateful Detection of Black-Box Adversarial AttacksJun 21, 2019Deep Leakage from GradientsJun 19, 2019Adversarial training approach for local data debiasing