Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks Authors: Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin | Published: 2019-05-28 DNN IP保護手法モデル評価防御的欺瞞 2019.05.28 2025.04.03 文献データベース
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28 モデル評価性能評価敵対的摂動手法 2019.05.28 2025.04.03 文献データベース
Controlling Neural Level Sets Authors: Matan Atzmon, Niv Haim, Lior Yariv, Ofer Israelov, Haggai Maron, Yaron Lipman | Published: 2019-05-28 | Updated: 2019-10-27 モデル評価最適化問題生成モデル 2019.05.28 2025.04.03 文献データベース
Snooping Attacks on Deep Reinforcement Learning Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15 強化学習手法攻撃の分類敵対的摂動手法 2019.05.28 2025.04.03 文献データベース
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder | Published: 2019-05-28 | Updated: 2019-11-27 ポイズニングモデル評価敵対的学習 2019.05.28 2025.04.03 文献データベース
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06 データセット分析モデル評価攻撃検出 2019.05.28 2025.04.03 文献データベース
Expected Tight Bounds for Robust Training Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12 堅牢性向上手法敵対的攻撃深層学習 2019.05.28 2025.04.03 文献データベース
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 データセット分析モデル評価異常検知アルゴリズム 2019.05.28 2025.04.03 文献データベース
Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss Authors: Pengcheng Li, Jinfeng Yi, Bowen Zhou, Lijun Zhang | Published: 2019-05-28 ポイズニング敵対的サンプル敵対的学習 2019.05.28 2025.04.03 文献データベース
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 データ収集手法攻撃の評価機械学習 2019.05.28 2025.04.03 文献データベース