Large amounts of tabular data remain underutilized due to privacy, data
...
As robustness verification methods are becoming more precise, training
c...
Malicious server (MS) attacks have enabled the scaling of data stealing ...
Collaborative learning techniques have the potential to enable training
...
Large language models (large LMs) are susceptible to producing text with...
Training certifiably robust neural networks remains a notoriously hard
p...
Stabilizer simulation can efficiently simulate an important class of qua...
Neural Ordinary Differential Equations (NODEs) are a novel neural
archit...
Large language models (LMs) are increasingly pretrained on massive codeb...
Text classifiers have promising applications in high-stake tasks such as...
Large language models have demonstrated outstanding performance on a wid...
Reliable neural networks (NNs) provide important inference-time reliabil...
We present a new method for scaling automatic configuration of computer
...
Fair representation learning (FRL) is a popular class of methods aiming ...
We propose the novel certified training method, SABR, which outperforms
...
While federated learning (FL) promises to preserve privacy in distribute...
Recent attacks have shown that user data can be recovered from FedSGD
up...
Tree-based models are used in many high-stakes application domains such ...
State-of-the-art neural network verifiers are fundamentally based on one...
Deep learning has recently achieved initial success in program analysis ...
Randomized Smoothing (RS) is considered the state-of-the-art approach to...
Recent work shows that sensitive user data can be reconstructed from gra...
Interval analysis (or interval bound propagation, IBP) is a popular tech...
Fair representation learning encodes user data to ensure fairness and
ut...
Federated learning is an established method for training machine learnin...
Monotone Operator Equilibrium Models (monDEQs) represent a class of mode...
Existing neural network verifiers compute a proof that each input is han...
We present a new certification method for image and point cloud segmenta...
Randomized Smoothing (RS) is a promising method for obtaining robustness...
Fair representation learning is an attractive approach that promises fai...
The use of deep 3D point cloud models in safety-critical applications, s...
Formal verification of neural networks is critical for their safe adopti...
Reliable evaluation of adversarial defenses is a challenging task, curre...
Certified defenses based on convex relaxations are an established techni...
Recent work has exposed the vulnerability of computer vision models to
s...
Recent work introduces zkay, a system for specifying and enforcing data
...
We present a novel method for generating symbolic adversarial examples: ...
Certifying the robustness of neural networks against adversarial attacks...
We present a precise and scalable verifier for recurrent neural networks...
Generative neural networks can be used to specify continuous transformat...
We develop an effective generation of adversarial attacks on neural mode...
We introduce a novel certification method for parametrized perturbations...
To effectively enforce fairness constraints one needs to define an
appro...
We propose a novel technique which addresses the challenge of learning
a...
We explore a new domain of learning to infer user interface attributes t...
In deep reinforcement learning (RL), adversarial attacks can trick an ag...
Training neural networks to be certifiably robust is a powerful defense
...
We present a training system, which can provably defend significantly la...
Permissionless blockchains allow the execution of arbitrary programs (ca...