Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18 Model Design and AccuracyAdversarial attackMachine Learning 2018.07.20 2025.05.28 Literature Database
Implicit Weight Uncertainty in Neural Networks Authors: Nick Pawlowski, Andrew Brock, Matthew C. H. Lee, Martin Rajchl, Ben Glocker | Published: 2017-11-03 | Updated: 2018-05-25 RobustnessAdversarial LearningMachine Learning 2017.11.03 2025.05.28 Literature Database
SPARK: Static Program Analysis Reasoning and Retrieving Knowledge Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03 Security Analysis MethodMachine LearningKnowledge Extraction Method 2017.11.03 2025.05.28 Literature Database
BinPro: A Tool for Binary Source Code Provenance Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02 Machine LearningWatermarking TechnologySimilarity Measurement 2017.11.02 2025.05.28 Literature Database
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01 Security Information ManagementMachine LearningWatermarking Technology 2017.11.01 2025.05.28 Literature Database
Intrusion Prevention and Detection in Grid Computing – The ALICE Case Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20 Security AnalysisProactive DefenseMachine Learning 2017.04.20 2025.05.28 Literature Database