Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 2022.05.27 2025.05.28 Literature Database
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26 2022.05.26 2025.05.28 Literature Database
Surprises in adversarially-trained linear regression Authors: Antônio H. Ribeiro, Dave Zachariah, Thomas B. Schön | Published: 2022-05-25 | Updated: 2022-10-20 2022.05.25 2025.05.28 Literature Database
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06 2022.05.25 2025.05.28 Literature Database
Additive Logistic Mechanism for Privacy-Preserving Self-Supervised Learning Authors: Yunhao Yang, Parham Gohari, Ufuk Topcu | Published: 2022-05-25 2022.05.25 2025.05.28 Literature Database
Differentially Private AUC Computation in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24 2022.05.24 2025.05.28 Literature Database
Toxicity Detection with Generative Prompt-based Inference Authors: Yau-Shian Wang, Yingshan Chang | Published: 2022-05-24 2022.05.24 2025.05.28 Literature Database
Fast & Furious: Modelling Malware Detection as Evolving Data Streams Authors: Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio | Published: 2022-05-24 | Updated: 2022-08-16 2022.05.24 2025.05.28 Literature Database
EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24 2022.05.24 2025.05.28 Literature Database
Process Mining Algorithm for Online Intrusion Detection System Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24 2022.05.24 2025.05.28 Literature Database