High Accuracy and High Fidelity Extraction of Neural Networks Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03 Model Extraction AttackModel EvaluationAdversarial Example 2019.09.03 2025.05.28 Literature Database
Metric Learning for Adversarial Robustness Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28 PoisoningImprovement of LearningVulnerability of Adversarial Examples 2019.09.03 2025.05.28 Literature Database
Detecting Covert Cryptomining using HPC Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15 Future ResearchMachine Learning AlgorithmFeature Selection Method 2019.08.31 2025.05.28 Literature Database
Your Smart Home Can’t Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks Authors: Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang | Published: 2019-08-31 IoT Traffic AnalysisPrivacy Protection MechanismFeature Selection Method 2019.08.31 2025.05.28 Literature Database
IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain Authors: Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra | Published: 2019-08-30 | Updated: 2019-09-09 Sensor Information ManagementData CollectionBlockchain 2019.08.30 2025.05.28 Literature Database
Universal, transferable and targeted adversarial attacks Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13 PoisoningAdversarial ExampleAdversarial Attack Detection 2019.08.29 2025.05.28 Literature Database
White-box vs Black-box: Bayes Optimal Strategies for Membership Inference Authors: Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou | Published: 2019-08-29 Sample ComplexityMembership InferenceDifficulty Calibration 2019.08.29 2025.05.28 Literature Database
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29 Robustness Verification MethodAdversarial ExampleMachine Learning Application 2019.08.29 2025.05.28 Literature Database
HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15 Text Extraction MethodInformation ExtractionMachine Learning Algorithm 2019.08.28 2025.05.28 Literature Database
Fairness-Aware Process Mining Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28 Data CollectionFeature Extraction MethodMeasurement of Observational Fairness 2019.08.28 2025.05.28 Literature Database