Black-box Adversarial Attacks with Bayesian Optimization Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2019-09-30 Bayesian OptimizationModel Design and AccuracyAdversarial Attack Methods 2019.09.30 2025.05.28 Literature Database
Decision Explanation and Feature Importance for Invertible Networks Authors: Juntang Zhuang, Nicha C. Dvornek, Xiaoxiao Li, Junlin Yang, James S. Duncan | Published: 2019-09-30 | Updated: 2019-10-15 Model Design and AccuracyMachine Learning AlgorithmFeature Selection Method 2019.09.30 2025.05.28 Literature Database
Dynamic data fusion using multi-input models for malware classification Authors: Viktor Zenkov, Jason Laska | Published: 2019-09-21 Data CollectionModel Design and AccuracyMachine Learning Algorithm 2019.09.21 2025.05.28 Literature Database
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices Authors: Yingyuan Yang, Xueli Huang, Yanhui Guo, Jinyuan Stella Sun | Published: 2018-08-02 | Updated: 2021-04-15 Class Mapping MethodProfile MatchingModel Design and Accuracy 2018.08.02 2025.05.28 Literature Database
Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25 Model Design and AccuracyDifferential PrivacyFeature Extraction Method 2018.07.25 2025.05.28 Literature Database
2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23 Trigger DetectionPrivacy AssessmentModel Design and Accuracy 2018.07.23 2025.05.28 Literature Database
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games Authors: Lijun Yu, Dawei Zhang, Xiangqun Chen, Xing Xie | Published: 2018-07-22 Game TheoryModel Design and AccuracyModel Evaluation 2018.07.22 2025.05.28 Literature Database
Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18 Model Design and AccuracyAdversarial attackMachine Learning 2018.07.20 2025.05.28 Literature Database
Sequence to Logic with Copy and Cache Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19 Model Design and AccuracyModel EvaluationRobustness Evaluation 2018.07.19 2025.05.28 Literature Database
NEUZZ: Efficient Fuzzing with Neural Program Smoothing Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12 Training Data GenerationProgram VerificationModel Design and Accuracy 2018.07.15 2025.05.28 Literature Database