YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks Authors: Kambiz Ghazinour, Stan Matwin, Marina Sokolova | Published: 2016-02-05 2016.02.05 2026.05.01 Literature Database
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan | Published: 2015-12-28 | Updated: 2017-12-18 2015.12.28 2026.05.01 Literature Database
Using Data Analytics to Detect Anomalous States in Vehicles Authors: Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi | Published: 2015-12-25 2015.12.25 2026.05.01 Literature Database
Deep-Spying: Spying using Smartwatch and Deep Learning Authors: Tony Beltramelli, Sebastian Risi | Published: 2015-12-17 2015.12.17 2026.05.01 Literature Database
A machine learning approach to anomaly-based detection on Android platforms Authors: Joshua Abah, Waziri O. V, Abdullahi M. B, Arthur U. M, Adewale O. S | Published: 2015-12-13 2015.12.13 2026.05.01 Literature Database
Where You Are Is Who You Are: User Identification by Matching Statistics Authors: Farid M. Naini, Jayakrishnan Unnikrishnan, Patrick Thiran, Martin Vetterli | Published: 2015-12-09 2015.12.09 2026.05.01 Literature Database
Explaining reviews and ratings with PACO: Poisson Additive Co-Clustering Authors: Chao-Yuan Wu, Alex Beutel, Amr Ahmed, Alexander J. Smola | Published: 2015-12-06 2015.12.06 2026.05.01 Literature Database
The Limitations of Deep Learning in Adversarial Settings Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami | Published: 2015-11-24 2015.11.24 2026.05.01 Literature Database
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks Authors: Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, Ananthram Swami | Published: 2015-11-14 | Updated: 2016-03-14 2015.11.14 2026.05.01 Literature Database
$k$-means: Fighting against Degeneracy in Sequential Monte Carlo with an Application to Tracking Authors: Kai Fan, Katherine Heller | Published: 2015-11-13 2015.11.13 2026.05.01 Literature Database