A Deep Learning Based Attack for The Chaos-based Image Encryption Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29 2019.07.29 2025.05.13 Literature Database
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran | Published: 2019-07-28 2019.07.28 2025.05.13 Literature Database
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28 2019.07.28 2025.05.13 Literature Database
Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03 2019.07.27 2025.05.13 Literature Database
An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01 2019.07.27 2025.05.13 Literature Database
Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26 2019.07.26 2025.05.13 Literature Database
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04 2019.07.26 2025.05.13 Literature Database
Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25 2019.07.25 2025.05.13 Literature Database
Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24 2019.07.24 2025.05.13 Literature Database
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24 2019.07.24 2025.05.13 Literature Database