Robustness of Bayesian Neural Networks to Gradient-Based Attacks Authors: Ginevra Carbone, Matthew Wicker, Luca Laurenti, Andrea Patane, Luca Bortolussi, Guido Sanguinetti | Published: 2020-02-11 | Updated: 2020-06-24 2020.02.11 2025.05.13 Literature Database
Improving the affordability of robustness training for DNNs Authors: Sidharth Gupta, Parijat Dube, Ashish Verma | Published: 2020-02-11 | Updated: 2020-04-30 2020.02.11 2025.05.13 Literature Database
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives Authors: Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte | Published: 2020-02-11 | Updated: 2021-04-07 2020.02.11 2025.05.13 Literature Database
Fine-grained Uncertainty Modeling in Neural Networks Authors: Rahul Soni, Naresh Shah, Jimmy D. Moore | Published: 2020-02-11 2020.02.11 2025.05.13 Literature Database
REALM: Retrieval-Augmented Language Model Pre-Training Authors: Kelvin Guu, Kenton Lee, Zora Tung, Panupong Pasupat, Ming-Wei Chang | Published: 2020-02-10 2020.02.10 2025.05.13 Literature Database
SparseIDS: Learning Packet Sampling with Reinforcement Learning Authors: Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby | Published: 2020-02-10 | Updated: 2020-05-04 2020.02.10 2025.05.13 Literature Database
Adversarial Attacks on Linear Contextual Bandits Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23 2020.02.10 2025.05.13 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 2020.02.10 2025.05.13 Literature Database
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman | Published: 2020-02-10 | Updated: 2020-08-06 2020.02.10 2025.05.13 Literature Database
Feature-level Malware Obfuscation in Deep Learning Authors: Keith Dillon | Published: 2020-02-10 2020.02.10 2025.05.13 Literature Database