Control Flow Change in Assembly as a Classifier in Malware Analysis Authors: Andree Linke, Nhien-An Le-Khac | Published: 2016-09-09 2016.09.09 2026.05.01 Literature Database
Stealing Machine Learning Models via Prediction APIs Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart | Published: 2016-09-09 | Updated: 2016-10-03 2016.09.09 2026.05.01 Literature Database
Towards Evaluating the Robustness of Neural Networks Authors: Nicholas Carlini, David Wagner | Published: 2016-08-16 | Updated: 2017-03-22 2016.08.16 2026.05.01 Literature Database
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2016-08-08 | Updated: 2016-12-08 2016.08.08 2026.05.01 Literature Database
QPass: a Merit-based Evaluation of Soccer Passes Authors: Laszlo Gyarmati, Rade Stanojevic | Published: 2016-08-08 2016.08.08 2026.05.01 Literature Database
Robust High-Dimensional Linear Regression Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea | Published: 2016-08-07 | Updated: 2016-08-09 2016.08.07 2026.05.01 Literature Database
Early Methods for Detecting Adversarial Images Authors: Dan Hendrycks, Kevin Gimpel | Published: 2016-08-01 | Updated: 2017-03-23 2016.08.01 2026.05.01 Literature Database
Attribute Learning for Network Intrusion Detection Authors: Jorge Luis Rivero Pérez, Bernardete Ribeiro | Published: 2016-07-28 2016.07.28 2026.05.01 Literature Database
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian | Published: 2016-07-28 2016.07.28 2026.05.01 Literature Database
Android Malware Detection Using Parallel Machine Learning Classifiers Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27 2016.07.27 2026.05.01 Literature Database