Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.13 Literature Database
Bayesian Hypernetworks Authors: David Krueger, Chin-Wei Huang, Riashat Islam, Ryan Turner, Alexandre Lacoste, Aaron Courville | Published: 2017-10-13 | Updated: 2018-04-24 Certified RobustnessModel DesignLabel 2017.10.13 2025.05.13 Literature Database
Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12 Convergence PropertyInformation SecurityStructural Attack 2017.10.12 2025.05.13 Literature Database
CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09 Convergence PropertyInterpretation MethodWatermark 2017.10.09 2025.05.13 Literature Database
Age Group and Gender Estimation in the Wild with Deep RoR Architecture Authors: Ke Zhang, Ce Gao, Liru Guo, Miao Sun, Xingfang Yuan, Tony X. Han, Zhenbing Zhao, Baogang Li | Published: 2017-10-09 Deep Learning ModelAttack that Analyzes Images with AI to Infer Personal InformationImage Processing 2017.10.09 2025.05.13 Literature Database
Privacy-Preserving Deep Inference for Rich User Data on The Cloud Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11 Privacy Protection MethodModel InversionFacial Recognition Technology 2017.10.04 2025.05.13 Literature Database
Neural Trojans Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03 Backdoor DetectionAttack MethodDeep Learning 2017.10.03 2025.05.13 Literature Database
Computation on Encrypted Data using Data Flow Authentication Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01 Information SecurityInformation Flow ControlWatermark 2017.10.01 2025.05.13 Literature Database
Privacy Preserving Identification Using Sparse Approximation with Ambiguization Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29 Sparse CodingPrivacy ProtectionPrivacy Protection Method 2017.09.29 2025.05.13 Literature Database
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack Authors: Arash Rahnama, Panos J. Antsaklis | Published: 2017-09-28 Byzantine Consensus MechanismConvergence analysisAnomaly Detection Method 2017.09.28 2025.05.13 Literature Database