Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Byzantine machine learning: A primer
The problem of Byzantine resilience in distributed machine learning, aka Byzantine machine
learning, consists of designing distributed algorithms that can train an accurate model …
learning, consists of designing distributed algorithms that can train an accurate model …
Adversarial interference and its mitigations in privacy-preserving collaborative machine learning
Despite the rapid increase of data available to train machine-learning algorithms in many
domains, several applications suffer from a paucity of representative and diverse data. The …
domains, several applications suffer from a paucity of representative and diverse data. The …
Diffusion models for adversarial purification
Adversarial purification refers to a class of defense methods that remove adversarial
perturbations using a generative model. These methods do not make assumptions on the …
perturbations using a generative model. These methods do not make assumptions on the …
How does information bottleneck help deep learning?
Numerous deep learning algorithms have been inspired by and understood via the notion of
information bottleneck, where unnecessary information is (often implicitly) minimized while …
information bottleneck, where unnecessary information is (often implicitly) minimized while …
Adversarial purification with score-based generative models
While adversarial training is considered as a standard defense method against adversarial
attacks for image classifiers, adversarial purification, which purifies attacked images into …
attacks for image classifiers, adversarial purification, which purifies attacked images into …
The best defense is a good offense: Adversarial augmentation against adversarial attacks
Many defenses against adversarial attacks (eg robust classifiers, randomization, or image
purification) use countermeasures put to work only after the attack has been crafted. We …
purification) use countermeasures put to work only after the attack has been crafted. We …
Balance, imbalance, and rebalance: Understanding robust overfitting from a minimax game perspective
Adversarial Training (AT) has become arguably the state-of-the-art algorithm for extracting
robust features. However, researchers recently notice that AT suffers from severe robust …
robust features. However, researchers recently notice that AT suffers from severe robust …
Understanding instance-level impact of fairness constraints
A variety of fairness constraints have been proposed in the literature to mitigate group-level
statistical bias. Their impacts have been largely evaluated for different groups of populations …
statistical bias. Their impacts have been largely evaluated for different groups of populations …
Vulnerabilities in video quality assessment models: The challenge of adversarial attacks
A Zhang, Y Ran, W Tang… - Advances in Neural …, 2023 - proceedings.neurips.cc
Abstract No-Reference Video Quality Assessment (NR-VQA) plays an essential role in
improving the viewing experience of end-users. Driven by deep learning, recent NR-VQA …
improving the viewing experience of end-users. Driven by deep learning, recent NR-VQA …
A dynamical system perspective for Lipschitz neural networks
The Lipschitz constant of neural networks has been established as a key quantity to enforce
the robustness to adversarial examples. In this paper, we tackle the problem of building $1 …
the robustness to adversarial examples. In this paper, we tackle the problem of building $1 …