DL-Droid: Deep learning based android malware detection using real devices Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2019-11-22 Model Performance EvaluationDeep LearningFeature Extraction Method 2019.11.22 2025.05.28 Literature Database
mm-Pose: Real-Time Human Skeletal Posture Estimation using mmWave Radars and CNNs Authors: Arindam Sengupta, Feng Jin, Renyuan Zhang, Siyang Cao | Published: 2019-11-21 Model Performance EvaluationRadar TechnologyDeep Learning 2019.11.21 2025.05.28 Literature Database
Mapper Based Classifier Authors: Jacek Cyranka, Alexander Georges, David Meyer | Published: 2019-10-17 | Updated: 2019-10-21 Model RobustnessDeep LearningGenerative Model 2019.10.17 2025.05.28 Literature Database
MUTE: Data-Similarity Driven Multi-hot Target Encoding for Neural Network Design Authors: Mayoore S. Jaiswal, Bumsoo Kang, Jinho Lee, Minsik Cho | Published: 2019-10-15 Model RobustnessDeep Learning 2019.10.15 2025.05.28 Literature Database
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14 DNN IP Protection MethodAdversarial LearningDeep Learning 2019.06.11 2025.05.28 Literature Database
Adversarial Attack Generation Empowered by Min-Max Optimization Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01 Adversarial LearningDeep LearningDefense Method 2019.06.09 2025.05.28 Literature Database
Identifying Classes Susceptible to Adversarial Attacks Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsDeep Learning 2019.05.30 2025.05.28 Literature Database
Bandlimiting Neural Networks Against Adversarial Attacks Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30 PoisoningVulnerability of Adversarial ExamplesDeep Learning 2019.05.30 2025.05.28 Literature Database
CopyCAT: Taking Control of Neural Policies with Constant Attacks Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21 Effective Perturbation MethodsAdversarial attackDeep Learning 2019.05.29 2025.05.28 Literature Database
Expected Tight Bounds for Robust Training Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12 Robustness Improvement MethodAdversarial attackDeep Learning 2019.05.28 2025.05.28 Literature Database