Generative Poisoning Attack Method Against Neural Networks Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03 Trigger DetectionPoisoningGenerative Model 2017.03.03 2025.05.28 Literature Database
Differentially Private Bayesian Learning on Distributed Data Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29 Data Privacy ManagementPrivacy Protection MechanismDifferential Privacy 2017.03.03 2025.05.28 Literature Database
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications Authors: Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra | Published: 2017-02-03 | Updated: 2017-02-07 URL-based DetectionData Flow AnalysisHybrid Analysis 2017.02.03 2026.05.01 Literature Database
Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks Authors: Guy Katz, Clark Barrett, David Dill, Kyle Julian, Mykel Kochenderfer | Published: 2017-02-03 | Updated: 2017-05-19 ReluplexアルゴリズムTrigger DetectionCertified Robustness 2017.02.03 2026.05.01 Literature Database
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla | Published: 2017-02-02 QoI評価手法Data CurationModel evaluation methods 2017.02.02 2026.05.01 Literature Database
Mining Anonymity: Identifying Sensitive Accounts on Twitter Authors: Sai Teja Peddinti, Keith W. Ross, Justin Cappos | Published: 2017-02-01 Privacy IssuesModel EvaluationFeature Extraction 2017.02.01 2026.05.01 Literature Database
Mobile phone identification through the built-in magnetometers Authors: Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Vladimir Kyovtorov | Published: 2017-01-26 Device Identification MethodModel EvaluationFeature Extraction 2017.01.26 2026.05.01 Literature Database
Learn&Fuzz: Machine Learning for Input Fuzzing Authors: Patrice Godefroid, Hila Peleg, Rishabh Singh | Published: 2017-01-25 PDF構造データオブジェクトModel Evaluation 2017.01.25 2026.05.01 Literature Database
Malicious URL Detection using Machine Learning: A Survey Authors: Doyen Sahoo, Chenghao Liu, Steven C. H. Hoi | Published: 2017-01-25 | Updated: 2019-08-21 Online LearningModel Extraction AttackFeature Interdependence 2017.01.25 2026.05.01 Literature Database
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning Authors: Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitraş | Published: 2017-01-17 Model DoSAdversarial Example DetectionVulnerability Research 2017.01.17 2026.05.01 Literature Database