AIセキュリティポータル

  • Literature Database
  • AI Security Map
  • Links
  • About us

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10
2017.03.10 2025.05.28
Literature Database

Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun | Published: 2017-03-08 | Updated: 2019-11-13
2017.03.08 2025.05.28
Literature Database

Generative Poisoning Attack Method Against Neural Networks

Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03
2017.03.03 2025.05.28
Literature Database

Differentially Private Bayesian Learning on Distributed Data

Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29
2017.03.03 2025.05.28
Literature Database
Previous 1 … 544 545
AIセキュリティポータル
  • Terms of Use
  • Privacy Policy
  • Follow us
Copyright© KDDI Research, Inc. All Rights Reserved.
    • Literature Database
    • AI Security Map
    • Links
    • About us
  • AIセキュリティポータル