Learning More Robust Features with Adversarial Training Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20 Adversarial LearningAdversarial LearningWatermarking Technology 2018.04.20 2025.05.28 Literature Database
On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09 Adversarial Example DetectionAdversarial Attack MethodsWatermarking Technology 2018.04.14 2025.05.28 Literature Database
Secure $k$-ish Nearest Neighbors Classifier Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30 Secure Arithmetic ComputationMachine Learning MethodWatermarking Technology 2018.01.22 2025.05.28 Literature Database
Gazelle: A Low Latency Framework for Secure Neural Network Inference Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16 Secure Arithmetic ComputationEncryption TechnologyWatermarking Technology 2018.01.16 2025.05.28 Literature Database
BinPro: A Tool for Binary Source Code Provenance Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02 Machine LearningWatermarking TechnologySimilarity Measurement 2017.11.02 2025.05.28 Literature Database
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01 Security Information ManagementMachine LearningWatermarking Technology 2017.11.01 2025.05.28 Literature Database