Agent-Agnostic Human-in-the-Loop Reinforcement Learning Authors: David Abel, John Salvatier, Andreas Stuhlmüller, Owain Evans | Published: 2017-01-15 Human-in-the-LoopProtocol ProcedureReinforcement Learning 2017.01.15 2026.05.01 Literature Database
Learning to Invert: Signal Recovery via Deep Convolutional Networks Authors: Ali Mousavi, Richard G. Baraniuk | Published: 2017-01-14 Deep Learning MethodComputational EfficiencyWeight Update Method 2017.01.14 2026.05.01 Literature Database
What Can I Do Now? Guiding Users in a World of Automated Decisions Authors: Matthias Gallé | Published: 2017-01-13 Online Decision MakingModel editing techniquesHuman-Centered Approach 2017.01.13 2026.05.01 Literature Database
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson | Published: 2017-01-09 Dataset AnalysisUnknown Attack DetectionDeep Learning Method 2017.01.09 2026.05.01 Literature Database
Private Incremental Regression Authors: Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin | Published: 2017-01-04 Privacy-Preserving Algorithm幾何学的手法Computational Efficiency 2017.01.04 2026.05.01 Literature Database
Dense Associative Memory is Robust to Adversarial Inputs Authors: Dmitry Krotov, John J Hopfield | Published: 2017-01-04 Certified RobustnessDeep Learning ModelGenerative Model 2017.01.04 2026.05.01 Literature Database
Classification of Smartphone Users Using Internet Traffic Authors: Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai | Published: 2017-01-01 Dataset AnalysisDevice Identification MethodPrivacy Analysis 2017.01.01 2026.05.01 Literature Database
Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics Authors: Xin Li, Fuxin Li | Published: 2016-12-22 | Updated: 2017-10-26 Adversarial ExampleAdversarial Example DetectionDeep Learning Model 2016.12.22 2026.05.01 Literature Database
DroidGen: Constraint-based and Data-Driven Policy Generation for Android Authors: Mohamed Nassim Seghir, David Aspinall | Published: 2016-12-22 API Securityポリシー生成Malware Detection 2016.12.22 2026.05.01 Literature Database
Handwritten Signature Verification Using Hand-Worn Devices Authors: Ben Nassi, Alona Levy, Yuval Elovici, Erez Shmueli | Published: 2016-12-19 Device Authentication手書き署名検証Behavior Analysis Method 2016.12.19 2026.05.01 Literature Database