Adversarial VC-dimension and Sample Complexity of Neural Networks Authors: Zetong Qi, T. J. Wilder | Published: 2019-12-18 2019.12.18 2025.05.28 Literature Database
SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks Authors: Simon Msika, Alejandro Quintero, Foutse Khomh | Published: 2019-12-18 2019.12.18 2025.05.28 Literature Database
Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15 2019.12.18 2025.05.28 Literature Database
MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30 2019.12.16 2025.05.28 Literature Database
Adversarial Model Extraction on Graph Neural Networks Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16 2019.12.16 2025.05.28 Literature Database
Constructing a provably adversarially-robust classifier from a high accuracy one Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2019-12-16 2019.12.16 2025.05.28 Literature Database
DAmageNet: A Universal Adversarial Dataset Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16 2019.12.16 2025.05.28 Literature Database
Pseudo Random Number Generation: a Reinforcement Learning approach Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15 2019.12.15 2025.05.28 Literature Database
Artificial Intelligence Techniques for Security Vulnerability Prevention Authors: Steve Kommrusch | Published: 2019-12-14 2019.12.14 2025.05.28 Literature Database
Private Federated Learning with Domain Adaptation Authors: Daniel Peterson, Pallika Kanani, Virendra J. Marathe | Published: 2019-12-13 2019.12.13 2025.05.28 Literature Database