Adversarial Perturbations Against Deep Neural Networks for Malware Classification Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel | Published: 2016-06-14 | Updated: 2016-06-16 2016.06.14 2026.05.01 Literature Database
The Crossover Process: Learnability and Data Protection from Inference Attacks Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07 2016.06.13 2026.05.01 Literature Database
Curie: A method for protecting SVM Classifier from Poisoning Attack Authors: Ricky Laishram, Vir Virander Phoha | Published: 2016-06-05 | Updated: 2016-06-07 2016.06.05 2026.05.01 Literature Database
Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends Authors: Alexy Bhowmick, Shyamanta M. Hazarika | Published: 2016-06-03 2016.06.03 2026.05.01 Literature Database
SUIS: An Online Graphical Signature-Based User Identification System Authors: Shahid Alam | Published: 2016-05-29 2016.05.29 2026.05.01 Literature Database
Data-driven software security: Models and methods Authors: Úlfar Erlingsson | Published: 2016-05-27 2016.05.27 2026.05.01 Literature Database
Deep Structured Energy Based Models for Anomaly Detection Authors: Shuangfei Zhai, Yu Cheng, Weining Lu, Zhongfei Zhang | Published: 2016-05-25 | Updated: 2016-06-16 2016.05.25 2026.05.01 Literature Database
A note on privacy preserving iteratively reweighted least squares Authors: Mijung Park, Max Welling | Published: 2016-05-24 2016.05.24 2026.05.01 Literature Database
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow | Published: 2016-05-24 2016.05.24 2026.05.01 Literature Database
A First Look at Ad-block Detection: A New Arms Race on the Web Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui | Published: 2016-05-19 2016.05.19 2026.05.01 Literature Database