Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics

H Brama, L Dery, T Grinshpoun - International Journal of Information …, 2023 - Springer
… [15], many machine learning performance measures are not suitable in the context of security,
since they may provide insufficient estimations or obscure experimental results. In addition…

Large scale private learning via low-rank reparametrization

D Yu, H Zhang, W Chen, J Yin… - … on Machine Learning, 2021 - proceedings.mlr.press
rank of the classification layer and the first residual block. For BERT, we plot the gradient rank
of … For SVHN and CIFAR10 datasets, we conduct MI attacks on trained WRN28-4 models. …

Multi-granular Adversarial Attacks against Black-box Neural Ranking Models

YA Liu, R Zhang, J Guo, M de Rijke, Y Fan… - arXiv preprint arXiv …, 2024 - arxiv.org
… 64], we focus on decision-based black-box attacks against NRMs for the adversarial
ranking attack task. This choice is motivated by the fact that the majority of real-world search …

R-gap: Recursive gradient attack on privacy

J Zhu, M Blaschko - arXiv preprint arXiv:2010.07733, 2020 - arxiv.org
… a Rank Analysis method, which can be used to estimate the risk of gradient attacks inherent
in … or closed-form-recursive attack is used. Experimental results demonstrate the utility of the …

[HTML][HTML] Attack detection in water distribution systems using machine learning

DT Ramotsoela, GP Hancke… - Human-centric Computing …, 2019 - Springer
… , which is why the ranking score doesn’t … machine learning algorithms. The algorithms B1–7
in the table are those from the competition with the number indicating their original ranking. …

Universal perturbation attack against image retrieval

J Li, R Ji, H Liu, X Hong, Y Gao… - Proceedings of the …, 2019 - openaccess.thecvf.com
ranking list which is more significant for retrieval. We argue it can not solve the retrieval
attack … We conclude that our proposed ranking distillation attack is practical, when the model …

Low-rank and sparse decomposition for low-query decision-based adversarial attacks

A Esmaeili, M Edraki, N Rahnavard… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… problem studied in classical 209 machine learning with image and video processing …
can be explained 212 with a low-rank background plus a sparse part which is decisive 213 …

RPL rank based‐attack mitigation scheme in IoT environment

MA Boudouaia, A Abouaissa… - International Journal …, 2021 - Wiley Online Library
… a Rank attack named DCB-Attack that targets the latter process in RPL topologies is proposed.
This mechanism uses a trust threshold based on the ranks … , lightweight machine learning-…

Machine learning with tree tensor networks, CP rank constraints, and tensor dropout

H Chen, T Barthel - … on Pattern Analysis and Machine …, 2024 - ieeexplore.ieee.org
… The main contribution of this work is to improve tensornetwork machine learning by
introducing more flexibility concerning the number of parameters and substantially reducing …

Low-rank Defenses Against Adversarial Attacks in Recommender Systems

N Entezari, EE Papalexakis - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
… -rank reconstructions and/or transformation of the attacked data has a significant alleviating
effect on the attack, … in adversarial machine learning show that machine learning algorithms …