2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23 Trigger DetectionPrivacy AssessmentModel Design and Accuracy 2018.07.23 2025.05.28 Literature Database
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games Authors: Lijun Yu, Dawei Zhang, Xiangqun Chen, Xing Xie | Published: 2018-07-22 Game TheoryModel Design and AccuracyModel Evaluation 2018.07.22 2025.05.28 Literature Database
A Preliminary Study On the Sustainability of Android Malware Detection Authors: Haipeng Cai | Published: 2018-07-22 | Updated: 2018-08-03 Malware DetectionModel EvaluationBehavior Analysis Method 2018.07.22 2025.05.28 Literature Database
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22 Model EvaluationEarly Detection MethodFeature Selection Method 2018.07.22 2025.05.28 Literature Database
Simultaneous Adversarial Training – Learn from Others Mistakes Authors: Zukang Liao | Published: 2018-07-21 | Updated: 2018-09-10 Certified RobustnessRobustness EvaluationAdversarial attack 2018.07.21 2025.05.28 Literature Database
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28 Model EvaluationAdversarial attack 2018.07.20 2025.05.28 Literature Database
Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18 Model Design and AccuracyAdversarial attackMachine Learning 2018.07.20 2025.05.28 Literature Database
Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior Authors: Vineeth S. Bhaskara, Debanjan Bhattacharyya | Published: 2018-07-19 | Updated: 2018-07-30 Malware ClassificationFeature Extraction MethodBehavior Analysis Method 2018.07.19 2025.05.28 Literature Database
Sequence to Logic with Copy and Cache Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19 Model Design and AccuracyModel EvaluationRobustness Evaluation 2018.07.19 2025.05.28 Literature Database
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding Authors: Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li | Published: 2018-07-18 PoisoningAdversarial LearningAdversarial attack 2018.07.18 2025.05.28 Literature Database