Are Labels Required for Improving Adversarial Robustness? Authors: Jonathan Uesato, Jean-Baptiste Alayrac, Po-Sen Huang, Robert Stanforth, Alhussein Fawzi, Pushmeet Kohli | Published: 2019-05-31 | Updated: 2019-12-05 Role of Machine LearningDeep Learning Technology 2019.05.31 2025.05.28 Literature Database
L0 Regularization Based Neural Network Design and Compression Authors: S. Asim Ahmed | Published: 2019-05-31 Optimization StrategyDeep Learning MethodDeep Learning Technology 2019.05.31 2025.05.28 Literature Database
Speaker Anonymization Using X-vector and Neural Waveform Models Authors: Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas Evans, Jean-Francois Bonastre | Published: 2019-05-30 Privacy-Preserving Data MiningDeep Learning TechnologySpeech Signal Processing 2019.05.30 2025.05.28 Literature Database
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.05.01 2025.05.28 Literature Database
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30 Malware DetectionDeep Learning TechnologyImage Classification Interpretation 2019.04.30 2025.05.28 Literature Database
Detecting Adversarial Examples through Nonlinear Dimensionality Reduction Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.04.30 2025.05.28 Literature Database
SEALion: a Framework for Neural Network Inference on Encrypted Data Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29 FrameworkEncryption MethodDeep Learning Technology 2019.04.29 2025.05.28 Literature Database
Deep pNML: Predictive Normalized Maximum Likelihood for Deep Neural Networks Authors: Koby Bibas, Yaniv Fogel, Meir Feder | Published: 2019-04-28 | Updated: 2020-01-08 Out-of-Distribution DetectionRobust EstimationDeep Learning Technology 2019.04.28 2025.05.28 Literature Database
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25 Intrusion Detection SystemDeep Learning TechnologyEvaluation Method 2019.04.25 2025.05.28 Literature Database
Detecting ADS-B Spoofing Attacks using Deep Neural Networks Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22 DNN-based Message ClassifierData Collection MethodDeep Learning Technology 2019.04.22 2025.05.28 Literature Database