Adversarial Examples Detection with Bayesian Neural Network Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23 Performance EvaluationAdversarial ExampleAdversarial Attack Detection 2021.05.18 2025.05.28 Literature Database
PassFlow: Guessing Passwords with Generative Flows Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini | Published: 2021-05-13 | Updated: 2021-12-14 Password GuessingPerformance EvaluationGenerative Model 2021.05.13 2025.05.28 Literature Database
Automated Software Vulnerability Assessment with Concept Drift Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21 Performance EvaluationConcept DriftVulnerability Analysis 2021.03.21 2025.05.28 Literature Database
Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15 Performance EvaluationRisk Assessment MethodDeep Learning Technology 2021.03.15 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 Performance EvaluationMachine Learning ApplicationEvaluation Method 2021.03.07 2025.05.28 Literature Database
Efficient Encrypted Inference on Ensembles of Decision Trees Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05 Performance EvaluationReal-Time InferenceDeep Learning Technology 2021.03.05 2025.05.28 Literature Database
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03 Performance EvaluationDistributed LearningComputational Efficiency 2021.03.03 2025.05.28 Literature Database
Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01 Data Privacy AssessmentPerformance EvaluationModel Performance Evaluation 2020.11.30 2025.05.28 Literature Database
Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01 Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2020.11.19 2025.05.28 Literature Database
Adversarially Robust Classification based on GLRT Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16 WatermarkingPerformance EvaluationAdversarial attack 2020.11.16 2025.05.28 Literature Database