Evaluating Automated Driving Planner Robustness against Adversarial Influence Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29 2022.05.29 2025.05.28 Literature Database
A Blessing of Dimensionality in Membership Inference through Regularization Authors: Jasper Tan, Daniel LeJeune, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-05-27 | Updated: 2023-04-14 2022.05.27 2025.05.28 Literature Database
Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27 2022.05.27 2025.05.28 Literature Database
How to Peel a Million: Validating and Expanding Bitcoin Clusters Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27 2022.05.27 2025.05.28 Literature Database
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18 2022.05.27 2025.05.28 Literature Database
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27 2022.05.27 2025.05.28 Literature Database
Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 2022.05.27 2025.05.28 Literature Database
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26 2022.05.26 2025.05.28 Literature Database
Surprises in adversarially-trained linear regression Authors: Antônio H. Ribeiro, Dave Zachariah, Thomas B. Schön | Published: 2022-05-25 | Updated: 2022-10-20 2022.05.25 2025.05.28 Literature Database
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06 2022.05.25 2025.05.28 Literature Database