As Large Language Models quickly become ubiquitous, it becomes critical ...
Sharpness-Aware Minimization (SAM) has recently emerged as a robust tech...
Watermarking is a commonly used strategy to protect creators' rights to
...
We discuss methods for visualizing neural network decision boundaries an...
Active learning (AL) algorithms aim to identify an optimal subset of dat...
The adversarial machine learning literature is largely partitioned into
...
Large organizations such as social media companies continually release d...
The design of revenue-maximizing auctions with strong incentive guarante...
Despite the vulnerability of object detectors to adversarial attacks, ve...
Optimal auctions maximize a seller's expected revenue subject to individ...
Adversarial patch attacks are among one of the most practical threat mod...
Convex relaxations are effective for training and certifying neural netw...
State-of-the-art adversarial attacks on neural networks use expensive
it...
Generative Adversarial Networks (GANs) have been used in several machine...