Secure Search on the Cloud via Coresets and Sketches Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19 プライバシー保護手法安全な算術計算数理的解析 2017.08.19 2025.05.13 Literature Database
Learning Universal Adversarial Perturbations with Generative Models Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05 モデルの頑健性保証攻撃手法敵対的サンプル 2017.08.17 2025.05.13 Literature Database
Continuous User Authentication via Unlabeled Phone Movement Patterns Authors: Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha | Published: 2017-08-15 データ収集手法モデル性能評価ユーザ行動分析 2017.08.15 2025.05.13 Literature Database
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 ポイズニングモデルの頑健性保証攻撃手法 2017.08.14 2025.05.13 Literature Database
Cascade Adversarial Machine Learning Regularized with a Unified Embedding Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17 ロバスト性分析攻撃手法敵対的学習 2017.08.08 2025.05.13 Literature Database
Fake News Detection on Social Media: A Data Mining Perspective Authors: Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu | Published: 2017-08-07 | Updated: 2017-09-03 SNS上の偽情報の拡散ユーザ行動分析偽情報の検出 2017.08.07 2025.05.13 Literature Database
Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01 教育的アプローチ敵対的サンプル画像分類手法 2017.08.01 2025.05.13 Literature Database
Quantum Privacy-Preserving Perceptron Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31 プライバシー保護技術差分プライバシー量子計算手法 2017.07.31 2025.05.13 Literature Database
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25 学習データの偏り情報セキュリティ機械学習フレームワーク 2017.07.25 2025.05.13 Literature Database
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24 データの起源と変遷プライバシー保護技術プライバシー手法 2017.07.24 2025.05.13 Literature Database