Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A taxonomy and survey of attacks against machine learning
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …
environment is benign. However, this assumption does not always hold, as it is often …
[PDF][PDF] Adversarially robust distillation
Abstract Knowledge distillation is effective for producing small, high-performance neural
networks for classification, but these small networks are vulnerable to adversarial attacks …
networks for classification, but these small networks are vulnerable to adversarial attacks …
Model compression with adversarial robustness: A unified optimization framework
Deep model compression has been extensively studied, and state-of-the-art methods can
now achieve high compression ratios with minimal accuracy loss. This paper studies model …
now achieve high compression ratios with minimal accuracy loss. This paper studies model …
Elasticflow: An elastic serverless training platform for distributed deep learning
This paper proposes ElasticFlow, an elastic serverless training platform for distributed deep
learning. ElasticFlow provides a serverless interface with two distinct features:(i) users …
learning. ElasticFlow provides a serverless interface with two distinct features:(i) users …
Research progress and challenges on application-driven adversarial examples: A survey
Great progress has been made in deep learning over the past few years, which drives the
deployment of deep learning–based applications into cyber-physical systems. But the lack of …
deployment of deep learning–based applications into cyber-physical systems. But the lack of …
QVIP: an ILP-based formal verification approach for quantized neural networks
Deep learning has become a promising programming paradigm in software development,
owing to its surprising performance in solving many challenging tasks. Deep neural …
owing to its surprising performance in solving many challenging tasks. Deep neural …
Adversarial machine learning attacks on multiclass classification of iot network traffic
Machine Learning-based Intrusion Detection Systems have been proven to be very effective
in the protection of IoT Networks. However, the expansion of Adversarial Machine Learning …
in the protection of IoT Networks. However, the expansion of Adversarial Machine Learning …
Masking adversarial damage: Finding adversarial saliency for robust and sparse network
Adversarial examples provoke weak reliability and potential security issues in deep neural
networks. Although adversarial training has been widely studied to improve adversarial …
networks. Although adversarial training has been widely studied to improve adversarial …
Characteristic examples: High-robustness, low-transferability fingerprinting of neural networks
This paper proposes Characteristic Examples for effectively fingerprinting deep neural
networks, featuring high-robustness to the base model against model pruning as well as low …
networks, featuring high-robustness to the base model against model pruning as well as low …
Towards compact and robust deep neural networks
Deep neural networks have achieved impressive performance in many applications but their
large number of parameters lead to significant computational and storage overheads …
large number of parameters lead to significant computational and storage overheads …