A Matrix Factorization Model for Hellinger-based Trust Management in Social Internet of Things Authors: Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar, H. Eugene Stanley | Published: 2019-09-26 | Updated: 2021-03-02 Signal AnalysisExperimental ValidationComputational Complexity 2019.09.26 2025.05.28 Literature Database
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19 Experimental ValidationAdversarial ExampleAdversarial attack 2019.09.19 2025.05.28 Literature Database
AutoGAN: Robust Classifier Against Adversarial Attacks Authors: Blerta Lindqvist, Shridatt Sugrim, Rauf Izmailov | Published: 2018-12-08 Certified RobustnessRobustness Improvement MethodExperimental Validation 2018.12.08 2025.05.28 Literature Database
Deep-RBF Networks Revisited: Robust Classification with Rejection Authors: Pourya Habib Zadeh, Reshad Hosseini, Suvrit Sra | Published: 2018-12-07 Certified RobustnessExperimental ValidationAdversarial Example 2018.12.07 2025.05.28 Literature Database
Bypassing Feature Squeezing by Increasing Adversary Strength Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27 Experimental ValidationAdversarial LearningAdversarial attack 2018.03.27 2025.05.28 Literature Database
Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice? Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05 Experimental ValidationMathematical AnalysisMachine Learning Algorithm 2018.01.05 2025.05.28 Literature Database
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13 Code GenerationExperimental ValidationMachine Learning Algorithm 2018.01.03 2025.05.28 Literature Database