Square Attack: a query-efficient black-box adversarial attack via random search Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29 2019.11.29 2025.05.13 Literature Database
Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28 2019.11.28 2025.05.13 Literature Database
Free-riders in Federated Learning: Attacks and Defenses Authors: Jierui Lin, Min Du, Jian Liu | Published: 2019-11-28 2019.11.28 2025.05.13 Literature Database
Android Botnet Detection using Convolutional Neural Networks Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27 2019.11.27 2025.05.13 Literature Database
Survey of Attacks and Defenses on Edge-Deployed Neural Networks Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27 2019.11.27 2025.05.13 Literature Database
An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26 2019.11.26 2025.05.13 Literature Database
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21 2019.11.26 2025.05.13 Literature Database
Defending Against Adversarial Machine Learning Authors: Alison Jenkins | Published: 2019-11-26 2019.11.26 2025.05.13 Literature Database
Assessing Supply Chain Cyber Risks Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26 2019.11.26 2025.05.13 Literature Database
Network Intrusion Detection based on LSTM and Feature Embedding Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26 2019.11.26 2025.05.13 Literature Database