One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 2019.11.25 2025.05.28 Literature Database
Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25 2019.11.25 2025.05.28 Literature Database
Failure Modes in Machine Learning Systems Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25 2019.11.25 2025.05.28 Literature Database
Adversarial Attack with Pattern Replacement Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25 2019.11.25 2025.05.28 Literature Database
Algorithmic Bias in Recidivism Prediction: A Causal Perspective Authors: Aria Khademi, Vasant Honavar | Published: 2019-11-24 2019.11.24 2025.05.28 Literature Database
Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 2019.11.23 2025.05.28 Literature Database
Universal adversarial examples in speech command classification Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13 2019.11.22 2025.05.28 Literature Database
Privacy-preserving parametric inference: a case for robust statistics Authors: Marco Avella-Medina | Published: 2019-11-22 2019.11.22 2025.05.28 Literature Database
Adversarial Learning of Privacy-Preserving and Task-Oriented Representations Authors: Taihong Xiao, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker, Ming-Hsuan Yang | Published: 2019-11-22 2019.11.22 2025.05.28 Literature Database
DL-Droid: Deep learning based android malware detection using real devices Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2019-11-22 2019.11.22 2025.05.28 Literature Database