Attack RMSE Leaderboard: An Introduction and Case Study

02/14/2018
by   Cong Xie, et al.
0

In this manuscript, we briefly introduce several tricks to climb the leaderboards which use RMSE for evaluation without exploiting any training data.

READ FULL TEXT

page 1

page 2

page 3

research
03/23/2022

An introduction to using dual quaternions to study kinematics

We advocate for the use of dual quaternions to represent poses, twists, ...
research
11/02/2018

ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles

Due to big data analysis ability, machine learning (ML) algorithms are b...
research
02/21/2019

Learning requirements for stealth attacks

The learning data requirements are analyzed for the construction of stea...
research
10/12/2018

Linear Program Reconstruction in Practice

We briefly report on a linear program reconstruction attack performed on...
research
04/13/2022

On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory

In security analysis, attack trees are a major tool for showing the stru...
research
01/14/2019

BoostNet: Bootstrapping detection of socialbots, and a case study from Guatemala

We present a method to reconstruct networks of socialbots given minimal ...

Please sign up or login with your details

Forgot password? Click here to reset