Automated email Generation for Targeted Attacks using Natural Language Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19 2019.08.19 2025.05.13 Literature Database
Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18 2019.08.18 2025.05.13 Literature Database
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03 2019.08.17 2025.05.13 Literature Database
On the Adversarial Robustness of Subspace Learning Authors: Fuwei Li, Lifeng Lai, Shuguang Cui | Published: 2019-08-17 2019.08.17 2025.05.13 Literature Database
Adversarial shape perturbations on 3D point clouds Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23 2019.08.16 2025.05.13 Literature Database
The Next 700 Policy Miners: A Universal Method for Building Policy Miners Authors: Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin | Published: 2019-08-16 | Updated: 2019-08-27 2019.08.16 2025.05.13 Literature Database
FSGAN: Subject Agnostic Face Swapping and Reenactment Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16 2019.08.16 2025.05.13 Literature Database
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15 2019.08.15 2025.05.13 Literature Database
Side-Channel Aware Fuzzing Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14 2019.08.14 2025.05.13 Literature Database
Interpretable Encrypted Searchable Neural Networks Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14 2019.08.14 2025.05.13 Literature Database