An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10 Data Extraction and AnalysisMachine Learning FrameworkVulnerability Management 2020.08.10 2025.05.13 Literature Database
Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$ Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24 Multi-Class ClassificationVulnerability ManagementEvaluation Method 2019.05.27 2025.05.13 Literature Database