Multi-Task Siamese Neural Network for Improving Replay Attack Detection Authors: Patrick von Platen, Fei Tao, Gokhan Tur | Published: 2020-02-16 Training MethodLoss FunctionFeature Extraction Method 2020.02.16 2025.05.28 Literature Database
Undersensitivity in Neural Reading Comprehension Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15 Training MethodVulnerability Attack MethodDefense Method 2020.02.15 2025.05.28 Literature Database
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15 Training MethodMalware DetectionMachine Learning Algorithm 2020.02.15 2025.05.28 Literature Database
Adversarial Distributional Training for Robust Deep Learning Authors: Yinpeng Dong, Zhijie Deng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2020-02-14 | Updated: 2020-11-19 Training MethodRobustness EvaluationLoss Function 2020.02.14 2025.05.28 Literature Database
Improving the affordability of robustness training for DNNs Authors: Sidharth Gupta, Parijat Dube, Ashish Verma | Published: 2020-02-11 | Updated: 2020-04-30 Training MethodRobustness Improvement MethodAdversarial Training 2020.02.11 2025.05.28 Literature Database
Fine-grained Uncertainty Modeling in Neural Networks Authors: Rahul Soni, Naresh Shah, Jimmy D. Moore | Published: 2020-02-11 Training MethodRobustness Improvement MethodHierarchical Uncertainty Model 2020.02.11 2025.05.28 Literature Database
SparseIDS: Learning Packet Sampling with Reinforcement Learning Authors: Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby | Published: 2020-02-10 | Updated: 2020-05-04 ML-Based IDSTraining MethodReinforcement Learning 2020.02.10 2025.05.28 Literature Database
Key Protected Classification for Collaborative Learning Authors: Mert Bülent Sarıyıldız, Ramazan Gökberk Cinbiş, Erman Ayday | Published: 2019-08-27 | Updated: 2020-04-22 Training MethodPrivacy Enhancing TechnologyCooperative System 2019.08.27 2025.05.28 Literature Database
Automated email Generation for Targeted Attacks using Natural Language Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19 LSTM Model Performance EvaluationTraining MethodPhishing Detection 2019.08.19 2025.05.28 Literature Database
Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18 Training MethodDeep Reinforcement LearningAdaptive Misuse Detection 2019.08.12 2025.05.28 Literature Database