Robustification of deep net classifiers by key based diversified aggregation with pre-filtering Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14 2019.05.14 2025.05.28 Literature Database
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12 2019.05.12 2025.05.28 Literature Database
ECG Identification under Exercise and Rest Situations via Various Learning Methods Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11 2019.05.11 2025.05.28 Literature Database
Interpreting and Evaluating Neural Network Robustness Authors: Fuxun Yu, Zhuwei Qin, Chenchen Liu, Liang Zhao, Yanzhi Wang, Xiang Chen | Published: 2019-05-10 2019.05.10 2025.05.28 Literature Database
On the Connection Between Adversarial Robustness and Saliency Map Interpretability Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10 2019.05.10 2025.05.28 Literature Database
Adversarial Defense Framework for Graph Neural Network Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10 2019.05.09 2025.05.28 Literature Database
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09 2019.05.09 2025.05.28 Literature Database
Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28 2019.05.09 2025.05.28 Literature Database
Reconstruction of Privacy-Sensitive Data from Protected Templates Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08 2019.05.08 2025.05.28 Literature Database
Adaptive Generation of Unrestricted Adversarial Inputs Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01 2019.05.07 2025.05.28 Literature Database