Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Joint Photographic Experts Group (JPEG) AI learning-based image coding system is an ongoing joint standardization effort between International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), and International Te ...
Object detection plays a critical role in various computer vision applications, encompassingdomains like autonomous vehicles, object tracking, and scene understanding. These applica-tions rely on detectors that generate bounding boxes around known object c ...
Poisoning attacks compromise the training data utilized to train machine learning (ML) models, diminishing their overall performance, manipulating predictions on specific test samples, and implanting backdoors. This article thoughtfully explores these atta ...
Artificial intelligence, particularly the subfield of machine learning, has seen a paradigm shift towards data-driven models that learn from and adapt to data. This has resulted in unprecedented advancements in various domains such as natural language proc ...
Machine learning (ML) applications are ubiquitous. They run in different environments such as datacenters, the cloud, and even on edge devices. Despite where they run, distributing ML training seems the only way to attain scalable, high-quality learning. B ...
Discovering new materials is essential but challenging, time-consuming, and expensive.In many cases, simulations can be useful for estimating material properties. For many of the most interesting properties, however, simulations are infeasible because of p ...
Digital twins are virtual models of physical objects or systems that enable real-time monitoring and analysis. In the field of stone masonry buildings, digital twins can be used to assess damage, predict maintenance needs, and opti- mize building performanc ...
Data augmentation has proven its usefulness to improve model generalization and performance. While it is commonly applied in computer vision application when it comes to multi-view systems, it is rarely used. Indeed geometric data augmentation can break th ...
Despite the large body of academic work on machine learning security, little is known about the occurrence of attacks on machine learning systems in the wild. In this paper, we report on a quantitative study with 139 industrial practitioners. We analyze at ...
Transportation, which deals with moving people and goods around, has a clear impact on the economic development of our society and our well-being. Traditionally, transportation was studied and analyzed using expensive sensors, such as induction loops, that ...