Feature Analysis of Encrypted Malicious Traffic Authors: Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp | Published: 2023-12-06 Certificate RatioCertificate Ratio Analysis 2023.12.06 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
Reliable Graph Neural Networks via Robust Aggregation Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29 Adversarial ExampleCertificate RatioEvaluation Method 2020.10.29 2025.05.28 Literature Database