Machine Learning Security in Industry: A Quantitative Survey
Related publications (56)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Interatomic potentials are essential for studying fundamental mechanisms of deformation and failure in metals and alloys because the relevant defects (dislocations, cracks, etc.) are far above the scales accessible to first-principles studies. Existing pot ...
We used to say “seeing is believing": this is no longer true. The digitization is changing all aspects of life and business. One of the more noticeable impacts is in how business documents are being authored, exchanged and processed. Many documents such as ...
The temperature and pressure dependence of structural phase transitions determine the structure-functionality relationships in many technologically important materials. Harmonic Hamiltonians have proven successful in predicting the vibrational properties o ...
Adversarial learning is an emergent technique that provides better security to machine learning systems by deliberately protecting them against specific vulnerabilities of the learning algorithms. Many adversarial learning problems can be cast equivalently ...
This paper brings together machine learning and investigative journalism to examine sockpuppets accounts, a historical breed of fake accounts that are non-automated and human-controlled. Due to their flexible and human-centered nature, sockpuppets pose a c ...
Decentralized machine learning over peer-to-peer networks is very appealing for it enables to learn personalized models without sharing users data, nor relying on any central server. Peers can improve upon their locally trained model across a network graph ...
We consider the problem of measuring how much a system reveals about its secret inputs. We work in the black-box setting: we assume no prior knowledge of the system's internals, and we run the system for choices of secrets and measure its leakage from the ...
Non-parametric probabilistic classification models are increasingly being investigated as an
alternative to Discrete Choice Models (DCMs), e.g. for predicting mode choice. There exist many strategies within the literature for model selection between DCMs, ...
This project aims to investigate the possibility of exploiting the polarimetric radar measurements to improve the discrimination between hail stones of different size, by involving machine learning techniques. ...
Games with continuous strategy sets arise in several machine learning problems (e.g. adversarial learning). For such games, simple no-regret learning algorithms exist in several cases and ensure convergence to coarse correlated equilibria (CCE). The effic ...