Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evaluations of machine learning privacy defenses are misleading
Empirical defenses for machine learning privacy forgo the provable guarantees of
differential privacy in the hope of achieving higher utility while resisting realistic adversaries …
differential privacy in the hope of achieving higher utility while resisting realistic adversaries …
Memorization in deep learning: A survey
J Wei, Y Zhang, LY Zhang, M Ding, C Chen… - arxiv preprint arxiv …, 2024 - arxiv.org
Deep Learning (DL) powered by Deep Neural Networks (DNNs) has revolutionized various
domains, yet understanding the intricacies of DNN decision-making and learning processes …
domains, yet understanding the intricacies of DNN decision-making and learning processes …
ADBM: Adversarial diffusion bridge model for reliable adversarial purification
Recently Diffusion-based Purification (DiffPure) has been recognized as an effective
defense method against adversarial examples. However, we find DiffPure which directly …
defense method against adversarial examples. However, we find DiffPure which directly …
Re-Evaluating Privacy in Centralized and Decentralized Learning: An Information-Theoretical and Empirical Study
Decentralized Federated Learning (DFL) has garnered attention for its robustness and
scalability compared to Centralized Federated Learning (CFL). While DFL is commonly …
scalability compared to Centralized Federated Learning (CFL). While DFL is commonly …
SoK: Memorisation in machine learning
Quantifying the impact of individual data samples on machine learning models is an open
research problem. This is particularly relevant when complex and high-dimensional …
research problem. This is particularly relevant when complex and high-dimensional …
Data Optimization in Deep Learning: A Survey
O Wu, R Yao - IEEE Transactions on Knowledge and Data …, 2025 - ieeexplore.ieee.org
Large-scale, high-quality data are considered an essential factor for the successful
application of many deep learning techniques. Meanwhile, numerous real-world deep …
application of many deep learning techniques. Meanwhile, numerous real-world deep …
Membership inference attacks via adversarial examples
The raise of machine learning and deep learning led to significant improvement in several
domains. This change is supported by both the dramatic rise in computation power and the …
domains. This change is supported by both the dramatic rise in computation power and the …
DeMem: Privacy-Enhanced Robust Adversarial Learning via De-Memorization
Adversarial robustness, the ability of a model to withstand manipulated inputs that cause
errors, is essential for ensuring the trustworthiness of machine learning models in real-world …
errors, is essential for ensuring the trustworthiness of machine learning models in real-world …
Trustworthiness of Stochastic Gradient Descent in Distributed Learning
Distributed learning (DL) leverages multiple nodes to accelerate training, enabling the
efficient optimization of large-scale models. Stochastic Gradient Descent (SGD), a key …
efficient optimization of large-scale models. Stochastic Gradient Descent (SGD), a key …
ProP: Efficient Backdoor Detection via Propagation Perturbation for Overparametrized Models
Backdoor attacks pose significant challenges to the security of machine learning models,
particularly for overparameterized models like deep neural networks. In this paper, we …
particularly for overparameterized models like deep neural networks. In this paper, we …