Computer activity learning from system call time series Authors: Curt Hastings, Ronnie Mainieri | Published: 2017-11-06 Clustering methodsTrigger DetectionMalware Detection Method 2017.11.06 2025.05.28 Literature Database
Comment on “Biologically inspired protection of deep networks from adversarial attacks” Authors: Wieland Brendel, Matthias Bethge | Published: 2017-04-05 Trigger DetectionCertified RobustnessAdversarial Learning 2017.04.05 2025.05.28 Literature Database
Generative Poisoning Attack Method Against Neural Networks Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03 Trigger DetectionPoisoningGenerative Model 2017.03.03 2025.05.28 Literature Database