BODAME: Bilevel Optimization for Defense Against Model Extraction Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11 2021.03.11 2025.05.28 Literature Database
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17 2021.03.11 2025.05.28 Literature Database
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 2021.03.10 2025.05.28 Literature Database
Quantum machine learning with differential privacy Authors: William M Watkins, Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2021-03-10 2021.03.10 2025.05.28 Literature Database
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06 2021.03.10 2025.05.28 Literature Database
Proof-of-Learning: Definitions and Practice Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09 2021.03.09 2025.05.28 Literature Database
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09 2021.03.09 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 2021.03.09 2025.05.28 Literature Database
Word Embedding Techniques for Malware Evolution Detection Authors: Sunhera Paul, Mark Stamp | Published: 2021-03-07 2021.03.07 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 2021.03.07 2025.05.28 Literature Database