MCMC for Variationally Sparse Gaussian Processes Authors: James Hensman, Alexander G. de G. Matthews, Maurizio Filippone, Zoubin Ghahramani | Published: 2015-06-12 Core Set ConstructionConvergence Guarantee因果推論 2015.06.12 2026.05.01 Literature Database
Adaptive Normalized Risk-Averting Training For Deep Neural Networks Authors: Zhiguang Wang, Tim Oates, James Lo | Published: 2015-06-08 | Updated: 2016-06-09 Adversarial LearningVisual Techniques 2015.06.08 2026.05.01 Literature Database
Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning Authors: Yarin Gal, Zoubin Ghahramani | Published: 2015-06-06 | Updated: 2016-10-04 Bayesian OptimizationQuantification of UncertaintyDeep Learning Method 2015.06.06 2026.05.01 Literature Database
A Deeper Look at Dataset Bias Authors: Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars | Published: 2015-05-06 Bias Elimination in Training DataPerformance EvaluationDeep Learning Model 2015.05.06 2026.05.01 Literature Database
Spectral Norm of Random Kernel Matrices with Applications to Privacy Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson | Published: 2015-04-22 Privacy Loss AnalysisMatrix Multiplication MethodsHigh-Dimensional Data Analysis 2015.04.22 2026.05.01 Literature Database
Detection of Information leakage in cloud Authors: Mansaf Alam, Shuchi Sethi | Published: 2015-04-14 | Updated: 2015-11-06 Secure Communication Channel仮想環境の攻撃出力処理 2015.04.14 2026.05.01 Literature Database
Consensus based Detection in the Presence of Data Falsification Attacks Authors: Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney | Published: 2015-04-14 Specific Measures Against Byzantine BehaviorAdversarial Attack AnalysisCommunication Model 2015.04.14 2026.05.01 Literature Database
Machine Learning Methods for Attack Detection in the Smart Grid Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor | Published: 2015-03-22 Online LearningPerformance EvaluationAdversarial Attack Analysis 2015.03.22 2026.05.01 Literature Database
Automated detection and classification of cryptographic algorithms in binary programs through machine learning Authors: Diane Duros Hosfelt | Published: 2015-03-04 Clustering methods機械学習によるマルウェア分類Feature Interdependence 2015.03.04 2026.05.01 Literature Database
Detecting Malware with Information Complexity Authors: Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis | Published: 2015-02-26 Malware DetectionRandom ForestInformation-Theoretic Evaluation 2015.02.26 2026.05.01 Literature Database