Mobile authentication of copy detection patterns Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18 2022.03.04 2025.05.28 Literature Database
Training language models to follow instructions with human feedback Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04 2022.03.04 2025.05.28 Literature Database
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 2022.03.04 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 2022.03.04 2025.05.28 Literature Database
Differentially Private Label Protection in Split Learning Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04 2022.03.04 2025.05.28 Literature Database
Why adversarial training can hurt robust accuracy Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03 2022.03.03 2025.05.28 Literature Database
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25 2022.03.02 2025.05.28 Literature Database
Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 2022.03.02 2025.05.28 Literature Database
PUMA: Performance Unchanged Model Augmentation for Training Data Removal Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02 2022.03.02 2025.05.28 Literature Database
A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01 2022.03.01 2025.05.28 Literature Database