Comment on “Biologically inspired protection of deep networks from adversarial attacks” Authors: Wieland Brendel, Matthias Bethge | Published: 2017-04-05 2017.04.05 2025.04.03 文献データベース
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2017-03-31 2017.03.31 2025.04.03 文献データベース
Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24 2017.03.30 2025.04.03 文献データベース
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28 2017.03.28 2025.04.03 文献データベース
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 2017.03.27 2025.04.03 文献データベース
Biologically inspired protection of deep networks from adversarial attacks Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27 2017.03.27 2025.04.03 文献データベース
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23 2017.03.23 2025.04.03 文献データベース
PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks Authors: Stefano Bennati, Catholijn M. Jonker | Published: 2017-03-21 2017.03.21 2025.04.03 文献データベース
CSI: A Hybrid Deep Model for Fake News Detection Authors: Natali Ruchansky, Sungyong Seo, Yan Liu | Published: 2017-03-20 | Updated: 2017-09-03 2017.03.20 2025.04.03 文献データベース
Counterfactual Fairness Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08 2017.03.20 2025.04.03 文献データベース