| 12019747 |
Adversarial interpolation backdoor detection |
Heiko H. Ludwig, Ebube Chuba, Benjamin J. Edwards, Taesung Lee, Ian M. Molloy |
2024-06-25 |
| 11856021 |
Detecting and mitigating poison attacks using data provenance |
Nathalie Baracaldo-Angel, Evelyn Duesterwald, Heiko H. Ludwig |
2023-12-26 |
| 11689566 |
Detecting and mitigating poison attacks using data provenance |
Nathalie Baracaldo-Angel, Evelyn Duesterwald, Heiko H. Ludwig |
2023-06-27 |
| 11663662 |
Automatic adjustment of limits based on machine learning forecasting |
Lillian Xu, Jeanette Jin |
2023-05-30 |
| 11645515 |
Automatically determining poisonous attacks on neural networks |
Nathalie Baracaldo Angel, Biplav Srivastava, Heiko H. Ludwig |
2023-05-09 |
| 11601468 |
Detection of an adversarial backdoor attack on a trained model at inference time |
Nathalie Baracaldo Angel, Yi Zhou, Ali Anwar, Heiko H. Ludwig |
2023-03-07 |
| 11538236 |
Detecting backdoor attacks using exclusionary reclassification |
Nathalie Baracaldo Angel, Heiko H. Ludwig |
2022-12-27 |
| 11487963 |
Automatically determining whether an activation cluster contains poisonous data |
Nathalie Baracaldo Angel, Biplav Srivastava, Heiko H. Ludwig |
2022-11-01 |
| 11188789 |
Detecting poisoning attacks on neural networks by activation clustering |
Wilka Carvalho, Heiko H. Ludwig, Ian M. Molloy, Taesung Lee, Jialong Zhang +1 more |
2021-11-30 |
| 11165664 |
Enforcing electronic service contracts between compu'iing devices |
Robert Engel, Shashank Rajamoni, Heiko H. Ludwig, Alexander Keller |
2021-11-02 |
| 11132444 |
Using gradients to detect backdoors in neural networks |
Wilka Carvalho, Benjamin J. Edwards, Taesung Lee, Ian M. Molloy, Jialong Zhang |
2021-09-28 |
| 10688029 |
Formulation preparation to treat mature skin for restoring moisture and retarding aging process |
Wen-Ching Chen, Shu Chen Wang, Hanafi Tanojo |
2020-06-23 |