Generalized Insider Attack Detection Implementation using NetFlow Data Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27 2020.10.27 2025.05.28 Literature Database
FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries Authors: Seng Pei Liew, Tsubasa Takahashi | Published: 2020-10-27 2020.10.27 2025.05.28 Literature Database
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26 2020.10.26 2025.05.28 Literature Database
Asymptotic Behavior of Adversarial Training in Binary Classification Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14 2020.10.26 2025.05.28 Literature Database
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25 2020.10.25 2025.05.28 Literature Database
ATRO: Adversarial Training with a Rejection Option Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24 2020.10.24 2025.05.28 Literature Database
Graph Information Bottleneck Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24 2020.10.24 2025.05.28 Literature Database
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30 2020.10.24 2025.05.28 Literature Database
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23 2020.10.23 2025.05.28 Literature Database
DualNet: Locate Then Detect Effective Payload with Deep Attention Network Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23 2020.10.23 2025.05.28 Literature Database