Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning Authors: Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitraş | Published: 2017-01-17 2017.01.17 2026.05.01 Literature Database
Agent-Agnostic Human-in-the-Loop Reinforcement Learning Authors: David Abel, John Salvatier, Andreas Stuhlmüller, Owain Evans | Published: 2017-01-15 2017.01.15 2026.05.01 Literature Database
Learning to Invert: Signal Recovery via Deep Convolutional Networks Authors: Ali Mousavi, Richard G. Baraniuk | Published: 2017-01-14 2017.01.14 2026.05.01 Literature Database
What Can I Do Now? Guiding Users in a World of Automated Decisions Authors: Matthias Gallé | Published: 2017-01-13 2017.01.13 2026.05.01 Literature Database
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson | Published: 2017-01-09 2017.01.09 2026.05.01 Literature Database
Private Incremental Regression Authors: Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin | Published: 2017-01-04 2017.01.04 2026.05.01 Literature Database
Dense Associative Memory is Robust to Adversarial Inputs Authors: Dmitry Krotov, John J Hopfield | Published: 2017-01-04 2017.01.04 2026.05.01 Literature Database
Classification of Smartphone Users Using Internet Traffic Authors: Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai | Published: 2017-01-01 2017.01.01 2026.05.01 Literature Database
Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics Authors: Xin Li, Fuxin Li | Published: 2016-12-22 | Updated: 2017-10-26 2016.12.22 2026.05.01 Literature Database
DroidGen: Constraint-based and Data-Driven Policy Generation for Android Authors: Mohamed Nassim Seghir, David Aspinall | Published: 2016-12-22 2016.12.22 2026.05.01 Literature Database