Defending Against Neural Fake News Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11 Identification of AI OutputCyber ThreatDeep Learning Method 2019.05.29 2025.05.28 Literature Database
A Compendium on Network and Host based Intrusion Detection Systems Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.06 2025.05.28 Literature Database
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 Adversarial attackMachine Learning AlgorithmDeep Learning Method 2019.04.05 2025.05.28 Literature Database
Malware Detection using Machine Learning and Deep Learning Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.04 2025.05.28 Literature Database
Bayesian Differential Privacy for Machine Learning Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-01-28 | Updated: 2020-08-19 Privacy DefinitionDifferential PrivacyDeep Learning Method 2019.01.28 2025.05.28 Literature Database
Interpretable Complex-Valued Neural Networks for Privacy Protection Authors: Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang | Published: 2019-01-28 | Updated: 2020-01-14 Differential PrivacyAdversarial ExampleDeep Learning Method 2019.01.28 2025.05.28 Literature Database
Improving Adversarial Robustness via Promoting Ensemble Diversity Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29 Certified RobustnessAdversarial LearningDeep Learning Method 2019.01.25 2025.05.28 Literature Database
Universal Rules for Fooling Deep Neural Networks based Text Classification Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03 Trigger DetectionAdversarial ExampleDeep Learning Method 2019.01.22 2025.05.28 Literature Database
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21 Terror Attack Data ClassificationModel evaluation methodsDeep Learning Method 2019.01.19 2025.05.28 Literature Database
Federated Optimization in Heterogeneous Networks Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21 Optimization StrategyDeep Learning MethodFederated Learning 2018.12.14 2025.05.28 Literature Database