Stealing Machine Learning Models via Prediction APIs Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart | Published: 2016-09-09 | Updated: 2016-10-03 Model Extraction Attackモデル抽出攻撃に関連するリスクDetection of Model Extraction Attacks 2016.09.09 2026.05.01 Literature Database
Towards Evaluating the Robustness of Neural Networks Authors: Nicholas Carlini, David Wagner | Published: 2016-08-16 | Updated: 2017-03-22 Model RobustnessCertified RobustnessAdversarial Example 2016.08.16 2026.05.01 Literature Database
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2016-08-08 | Updated: 2016-12-08 Privacy AssurancePrivacy Enhancing TechnologyModel evaluation methods 2016.08.08 2026.05.01 Literature Database
QPass: a Merit-based Evaluation of Soccer Passes Authors: Laszlo Gyarmati, Rade Stanojevic | Published: 2016-08-08 Core Set Selection MethodSimulation Result EvaluationModel evaluation methods 2016.08.08 2026.05.01 Literature Database
Robust High-Dimensional Linear Regression Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea | Published: 2016-08-07 | Updated: 2016-08-09 PoisoningModel RobustnessAdversarial Training 2016.08.07 2026.05.01 Literature Database
Early Methods for Detecting Adversarial Images Authors: Dan Hendrycks, Kevin Gimpel | Published: 2016-08-01 | Updated: 2017-03-23 Adversarial ExampleAdversarial LearningAdversarial Training 2016.08.01 2026.05.01 Literature Database
Attribute Learning for Network Intrusion Detection Authors: Jorge Luis Rivero Pérez, Bernardete Ribeiro | Published: 2016-07-28 Algorithm DesignMethods for Dynamically Identifying New Classes属性学習 2016.07.28 2026.05.01 Literature Database
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian | Published: 2016-07-28 Security Analysis MethodData Extraction and AnalysisApplication of Text Classification 2016.07.28 2026.05.01 Literature Database
Android Malware Detection Using Parallel Machine Learning Classifiers Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27 API SecurityPerformance EvaluationFeature Selection Method 2016.07.27 2026.05.01 Literature Database
N-opcode Analysis for Android Malware Classification and Categorization Authors: BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer | Published: 2016-07-27 Dynamic Analysis FrameworkPerformance EvaluationFeature Selection Method 2016.07.27 2026.05.01 Literature Database