A collection of academic articles, published methodology, and datasets on the subject of unlearnable examples.
Unlearnable examples (ULEs) refer to data points or scenarios that are exceptionally challenging or even impossible for machine learning models to learn or generalize from due to factors such as noisy data, lack of information, complexity, conceptual limitations, adversarial input, or insufficient data, posing significant challenges to the capabilities of the models. Researchers continuously strive to overcome these limitations through algorithmic improvements and data enhancements..
- Dataset: CIFAR-10, CIFAR-100, ImageNet-100, Tiny-ImageNet, ...
- Architectures: ResNet-18, VGG-16, Wide ResNet-34-10, DenseNet-121,...
- Perturbations: $|\delta|{\infty}\le \epsilon$, where $\epsilon = { 4/255,8/255}$; $|\delta|{2}\le \epsilon$, where
$\epsilon = { 0.25,0.5,0.75}$ ,...
- The generated noise must be non-suspicious.
- When training a model on the perturbed images, the model must not be able to learn to predict the classes corresponding to clean images.
Paper Title | Year | Author | Venue | Method | Code |
---|---|---|---|---|---|
Unlearnable Clusters: Towards Label-Agnostic Unlearnable Examples | 2023 | Zhang et al. | CVPR | Unlearnable Clusters | [Code] |
CUDA: Convolution-based Unlearnable Datasets | 2023 | Sadasivan et al. | CVPR | Convolutional Filters | [Code] |
Transferable Unlearnable Examples | 2023 | Ren et al. | ICLR | Data-wise and Training-wise Transferability | - |
Robust unlearnable examples: Protecting data against adversarial learning | 2022 | Fu et al. | ICLR | Robust error-minimizing noise | [Code] |
Unlearnable Examples: Making Personal Data Unexploitable | 2021 | Huang et al. | ICLR | Error-minimizing Noise | [Code] |
Going Grayscale: The Road to Understanding and Improving Unlearnable Examples | 2021 | Liu et al. | Arxiv | ULEO-GrayAugs | [Code] |
Paper Title | Year | Author | Venue | Method | Code |
---|---|---|---|---|---|
Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples | 2023 | Jiang et al. | MM | Diffusion-based | [Code] |
Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. | 2023 | Liu et al. | ICML | Compression-based Method | [Code] |
Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks | 2023 | Qin et al. | Arxiv | Adversarial augmentations | [Code] |
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models | 2023 | Dolatabadi et al. | Arxiv | Diffusion-based | - |