Training Set Camouflage Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13 Data CollectionApplication of Text ClassificationImprovement of Learning 2018.12.13 2025.05.13 Literature Database
Learning-Aided Physical Layer Authentication as an Intelligent Process Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07 Training MethodImprovement of LearningMachine Learning Method 2018.08.07 2025.05.13 Literature Database
Active Learning for Wireless IoT Intrusion Detection Authors: Kai Yang, Jie Ren, Yanqiao Zhu, Weiyi Zhang | Published: 2018-08-04 Query Generation MethodIntrusion Detection SystemImprovement of Learning 2018.08.04 2025.05.13 Literature Database
Biologically inspired protection of deep networks from adversarial attacks Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27 Model Design and AccuracyCertified RobustnessImprovement of Learning 2017.03.27 2025.05.13 Literature Database
Understanding Black-box Predictions via Influence Functions Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29 PoisoningImprovement of LearningExplainability Evaluation 2017.03.14 2025.05.13 Literature Database