Encrypted statistical machine learning: new privacy preserving methods Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-27 Ensemble LearningData Augmentation in Encrypted Domains暗号化環境でのデータ処理 2015.08.27 2026.05.01 Literature Database
A review of homomorphic encryption and software tools for encrypted statistical machine learning Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-26 Privacy Protection MechanismPrivacy-Preserving Machine Learning暗号化スキームの詳細 2015.08.26 2026.05.01 Literature Database
Efficient Private Statistics with Succinct Sketches Authors: Luca Melis, George Danezis, Emiliano De Cristofaro | Published: 2015-08-25 | Updated: 2016-01-06 Data CollectionPrivacy Protection MechanismDifferential Privacy 2015.08.25 2026.05.01 Literature Database
Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features Authors: Joshua Saxe, Konstantin Berlin | Published: 2015-08-13 | Updated: 2015-09-03 Machine learningModel Performance EvaluationMalware Detection with Limited Samples 2015.08.13 2026.05.01 Literature Database
Automatic Extraction of the Passing Strategies of Soccer Teams Authors: Laszlo Gyarmati, Xavier Anguera | Published: 2015-08-10 チーム戦略分析Data CollectionFeature Extraction Method 2015.08.10 2026.05.01 Literature Database
Using Deep Learning for Detecting Spoofing Attacks on Speech Signals Authors: Alan Godoy, Flávio Simões, José Augusto Stuchi, Marcus de Assis Angeloni, Mário Uliani, Ricardo Violato | Published: 2015-08-07 | Updated: 2016-01-19 Detection of DeepfakesFeature ExtractionSpeech Recognition Process 2015.08.07 2026.05.01 Literature Database
STC Anti-spoofing Systems for the ASVspoof 2015 Challenge Authors: Sergey Novoselov, Alexandr Kozlov, Galina Lavrentyeva, Konstantin Simonchik, Vadim Shchemelinin | Published: 2015-07-29 Adversarial Attack AssessmentFeature ExtractionSpeech Recognition Process 2015.07.29 2026.05.01 Literature Database
On the Unicity of Smartphone Applications Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia | Published: 2015-07-28 | Updated: 2015-10-29 Data Origins and EvolutionPrivacy Loss AnalysisConvergence Guarantee 2015.07.28 2026.05.01 Literature Database
Differentially Private Ordinary Least Squares Authors: Or Sheffet | Published: 2015-07-09 | Updated: 2017-08-21 Privacy Loss AnalysisDifferential PrivacyMatrix Multiplication Methods 2015.07.09 2026.05.01 Literature Database
Malware Task Identification: A Data Driven Approach Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch | Published: 2015-07-07 Digital Forensics属性学習Vulnerability Analysis 2015.07.07 2026.05.01 Literature Database