End-to-End Adversarial Learning for Intrusion Detection in Computer Networks Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25 2019.04.25 2025.05.28 Literature Database
A Robust Approach for Securing Audio Classification Against Adversarial Attacks Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25 2019.04.24 2025.05.28 Literature Database
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24 2019.04.24 2025.05.28 Literature Database
Detecting ADS-B Spoofing Attacks using Deep Neural Networks Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22 2019.04.22 2025.05.28 Literature Database
Galaxy Learning — A Position Paper Authors: Chao Wu, Jun Xiao, Gang Huang, Fei Wu | Published: 2019-04-22 2019.04.22 2025.05.28 Literature Database
STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing Authors: Ming Liu, Yukang Ding, Min Xia, Xiao Liu, Errui Ding, Wangmeng Zuo, Shilei Wen | Published: 2019-04-22 2019.04.22 2025.05.28 Literature Database
Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21 2019.04.21 2025.05.28 Literature Database
Android Malicious Application Classification Using Clustering Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21 2019.04.21 2025.05.28 Literature Database
Privacy-Enhancing Context Authentication from Location-Sensitive Data Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10 2019.04.18 2025.05.28 Literature Database
Intrusion Detection Mechanism Using Fuzzy Rule Interpolation Authors: Mohammad Almseidin, Szilveszter Kovacs | Published: 2019-04-18 2019.04.18 2025.05.28 Literature Database