Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 Adversarial Attack MethodsMachine Learning AlgorithmSpeech Enhancement Technology 2018.01.02 2025.05.28 Literature Database
A Deep Belief Network Based Machine Learning System for Risky Host Detection Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29 Risk ManagementPerformance Evaluation MetricsMachine Learning Algorithm 2017.12.29 2025.05.28 Literature Database
Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16 Model DesignMachine Learning AlgorithmMachine Learning Framework 2017.12.29 2025.05.28 Literature Database
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods Authors: Mouhammd Alkasassbeh | Published: 2017-12-27 Machine Learning AlgorithmFeature Selection MethodCommunication System 2017.12.27 2025.05.28 Literature Database
Building Robust Deep Neural Networks for Road Sign Detection Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2017.12.26 2025.05.28 Literature Database
The Robust Manifold Defense: Adversarial Training using Generative Models Authors: Ajil Jalal, Andrew Ilyas, Constantinos Daskalakis, Alexandros G. Dimakis | Published: 2017-12-26 | Updated: 2019-07-10 Certified RobustnessAdversarial Example DetectionAdversarial Learning 2017.12.26 2025.05.28 Literature Database
Towards Measuring Membership Privacy Authors: Yunhui Long, Vincent Bindschaedler, Carl A. Gunter | Published: 2017-12-25 Privacy Risk ManagementMembership InferencePrivacy Protection in Machine Learning 2017.12.25 2025.05.28 Literature Database
Query-limited Black-box Attacks to Classifiers Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23 Query Generation MethodAdversarial Attack MethodsMachine Learning Algorithm 2017.12.23 2025.05.28 Literature Database
Differentially Private Federated Learning: A Client Level Perspective Authors: Robin C. Geyer, Tassilo Klein, Moin Nabi | Published: 2017-12-20 | Updated: 2018-03-01 Client-Side ComponentPrivacy ProtectionFederated Learning 2017.12.20 2025.05.28 Literature Database
Differentially Private Distributed Learning for Language Modeling Tasks Authors: Vadim Popov, Mikhail Kudinov, Irina Piontkovskaya, Petr Vytovtov, Alex Nevidomsky | Published: 2017-12-20 | Updated: 2018-03-06 Detection of Poison Data for Backdoor AttacksPrivacy IssuesDifferential Privacy 2017.12.20 2025.05.28 Literature Database