Adversarial Self-Supervised Contrastive Learning Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26 Performance EvaluationPoisoningAdversarial Attack Detection 2020.06.13 2025.05.28 Literature Database
Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02 Backdoor AttackPerformance EvaluationAttack Scenario Analysis 2020.06.11 2025.05.28 Literature Database
Interpolation between Residual and Non-Residual Networks Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16 AlgorithmPerformance EvaluationImprovement of Learning 2020.06.10 2025.05.28 Literature Database
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15 Performance EvaluationPrivacy AssessmentEncryption Method 2020.06.07 2025.05.28 Literature Database
COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28 Performance EvaluationPrivacy AssessmentMachine Learning 2020.05.28 2025.05.28 Literature Database
On the Difficulty of Membership Inference Attacks Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22 Performance EvaluationAttack EvaluationMachine Learning 2020.05.27 2025.05.28 Literature Database
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17 Performance EvaluationPoisoningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Clonability of anti-counterfeiting printable graphical codes: a machine learning approach Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18 Performance EvaluationAdversarial Attack DetectionDeep Learning Model 2019.03.18 2025.05.28 Literature Database
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23 Performance EvaluationPhishing DetectionPoisoning 2019.02.23 2025.05.28 Literature Database
Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23 Data PreprocessingPerformance EvaluationClassification Pattern Analysis 2019.02.18 2025.05.28 Literature Database