Initialization Method

Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29
Initialization Method
Adversarial Perturbation Techniques
Optimization Problem

A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory

Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08
Clustering methods
Fraudulent Transaction
Initialization Method