Consider the task of learning a hypothesis class ℋ in the
presence of an...
Privacy attacks on machine learning models aim to identify the data that...
NeuraCrypt (Yara et al. arXiv 2021) is an algorithm that converts a sens...
In this paper, we study PAC learnability and certification under
instanc...
Poisoning attacks have emerged as a significant security threat to machi...
Product measures of dimension n are known to be concentrated in Hamming
...
In this work, we initiate a formal study of probably approximately corre...
Many recent works have shown that adversarial examples that fool classif...
Over recent years, devising classification algorithms that are robust to...
We study adversarial perturbations when the instances are uniformly
dist...
Making learners robust to adversarial perturbation at test time (i.e.,
e...
In a poisoning attack against a learning algorithm, an adversary tampers...
Many modern machine learning classifiers are shown to be vulnerable to
a...
Mahloujifar and Mahmoody (TCC'17) studied attacks against learning algor...