Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection Authors: João Vitorino, Nuno Oliveira, Isabel Praça | Published: 2022-03-08 | Updated: 2022-03-29 2022.03.08 2025.05.28 Literature Database
LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data Authors: Lianlian Jiang, Yuexuan Wang, Wenyi Zheng, Chao Jin, Zengxiang Li, Sin G. Teo | Published: 2022-03-08 2022.03.08 2025.05.28 Literature Database
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08 2022.03.08 2025.05.28 Literature Database
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15 2022.03.07 2025.05.28 Literature Database
Vulnerability Detection in Open Source Software: An Introduction Authors: Stuart Millar | Published: 2022-03-06 2022.03.06 2025.05.28 Literature Database
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05 2022.03.05 2025.05.28 Literature Database
Mobile authentication of copy detection patterns Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18 2022.03.04 2025.05.28 Literature Database
Training language models to follow instructions with human feedback Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04 2022.03.04 2025.05.28 Literature Database
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 2022.03.04 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 2022.03.04 2025.05.28 Literature Database