Face2Face: Real-time Face Capture and Reenactment of RGB Videos Authors: Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner | Published: 2020-07-29 2020.07.29 2025.05.13 Literature Database
Label-Only Membership Inference Attacks Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05 2020.07.28 2025.05.13 Literature Database
Tempered Sigmoid Activations for Deep Learning with Differential Privacy Authors: Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson | Published: 2020-07-28 2020.07.28 2025.05.13 Literature Database
Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12 2020.07.28 2025.05.13 Literature Database
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28 2020.07.28 2025.05.13 Literature Database
Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach Authors: Parker Lamb, Alexander Millar, Ramon Fuentes | Published: 2020-07-27 | Updated: 2020-10-13 2020.07.27 2025.05.13 Literature Database
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15 2020.07.27 2025.05.13 Literature Database
Feature importance in mobile malware detection Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28 2020.07.27 2025.05.13 Literature Database
Evaluation of Federated Learning in Phishing Email Detection Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21 2020.07.27 2025.05.13 Literature Database
Detecting malicious PDF using CNN Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02 2020.07.24 2025.05.13 Literature Database