Universal adversarial perturbations for multiple classification tasks with quantum classifiers Authors: Yun-Zhong Qiu | Published: 2023-06-21 | Updated: 2023-10-25 2023.06.21 2025.05.28 Literature Database
Adversarial Training Should Be Cast as a Non-Zero-Sum Game Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18 2023.06.19 2025.05.28 Literature Database
Cyber Key Terrain Identification Using Adjusted PageRank Centrality Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24 2023.06.19 2025.05.28 Literature Database
Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels Authors: Hang Liu, Jia Yan, Ying-Jun Angela Zhang | Published: 2023-06-19 | Updated: 2023-12-25 2023.06.19 2025.05.28 Literature Database
Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17 2023.06.17 2025.05.28 Literature Database
Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network Authors: Fan Liu, Siqi Lai, Yansong Ning, Hao Liu | Published: 2023-06-17 2023.06.17 2025.05.28 Literature Database
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo | Published: 2023-06-17 | Updated: 2024-02-08 2023.06.17 2025.05.28 Literature Database
Evaluating Superhuman Models with Consistency Checks Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19 2023.06.16 2025.05.28 Literature Database
You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16 2023.06.16 2025.05.28 Literature Database
Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks Authors: Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo | Published: 2023-06-16 2023.06.16 2025.05.28 Literature Database