Crafting Adversarial Input Sequences for Recurrent Neural Networks Authors: Nicolas Papernot, Patrick McDaniel, Ananthram Swami, Richard Harang | Published: 2016-04-28 Adversarial ExampleAdversarial attackDeep Learning 2016.04.28 2026.05.01 Literature Database
Finding Common Characteristics Among NBA Playoff and Championship Teams: A Machine Learning Approach Authors: Ikjyot Singh Kohli | Published: 2016-04-18 | Updated: 2017-04-03 Model Performance EvaluationDecision TreeFeature Importance Analysis 2016.04.18 2026.05.01 Literature Database
A General Retraining Framework for Scalable Adversarial Classification Authors: Bo Li, Yevgeniy Vorobeychik, Xinyun Chen | Published: 2016-04-09 | Updated: 2016-11-26 Adversarial LearningAdversarial attackAdversarial Training 2016.04.09 2026.05.01 Literature Database
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning Authors: Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti | Published: 2016-03-20 Data CollectionPrivacy Risk ManagementModel Performance Evaluation 2016.03.20 2026.05.01 Literature Database
A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions Authors: Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult | Published: 2016-03-19 | Updated: 2016-12-02 Digital ForensicsMalware DetectionModel Extraction Attack 2016.03.19 2026.05.01 Literature Database
Communication-Efficient Learning of Deep Networks from Decentralized Data Authors: H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, Blaise Agüera y Arcas | Published: 2016-02-17 | Updated: 2023-01-26 Deep Learning MethodReduction of Communication CostsFederated Learning 2016.02.17 2026.05.01 Literature Database
“Why Should I Trust You?”: Explaining the Predictions of Any Classifier Authors: Marco Tulio Ribeiro, Sameer Singh, Carlos Guestrin | Published: 2016-02-16 | Updated: 2016-08-09 XAI (Explainable AI)Feature Importance Analysis説明可能な機械学習 2016.02.16 2026.05.01 Literature Database
Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization Authors: Toshiyuki Takada, Hiroyuki Hanada, Yoshiji Yamada, Jun Sakuma, Ichiro Takeuchi | Published: 2016-02-15 Secure Communication ChannelPrivacy-Preserving Machine LearningEncryption Protocol 2016.02.15 2026.05.01 Literature Database
Practical Black-Box Attacks against Machine Learning Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami | Published: 2016-02-08 | Updated: 2017-03-19 Adversarial ExampleAdversarial attackAdversarial Transferability 2016.02.08 2026.05.01 Literature Database
YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks Authors: Kambiz Ghazinour, Stan Matwin, Marina Sokolova | Published: 2016-02-05 Data CollectionPrivacy Risk ManagementPrivacy Protection Mechanism 2016.02.05 2026.05.01 Literature Database