Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 2022.10.25 2025.04.03 文献データベース
Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe Authors: Xiang Yue, Huseyin A. Inan, Xuechen Li, Girish Kumar, Julia McAnallen, Hoda Shajari, Huan Sun, David Levitan, Robert Sim | Published: 2022-10-25 | Updated: 2023-07-18 2022.10.25 2025.04.03 文献データベース
A White-Box Adversarial Attack Against a Digital Twin Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25 2022.10.25 2025.04.03 文献データベース
Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano Authors: Chuan Guo, Alexandre Sablayrolles, Maziar Sanjabi | Published: 2022-10-24 | Updated: 2023-08-10 2022.10.24 2025.04.03 文献データベース
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-24 | Updated: 2023-10-12 2022.10.24 2025.04.03 文献データベース
On the Robustness of Dataset Inference Authors: Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan | Published: 2022-10-24 | Updated: 2023-06-19 2022.10.24 2025.04.03 文献データベース
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24 2022.10.24 2025.04.03 文献データベース
Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 2022.10.24 2025.04.03 文献データベース
Ares: A System-Oriented Wargame Framework for Adversarial ML Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24 2022.10.24 2025.04.03 文献データベース
Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman | Published: 2022-10-23 2022.10.23 2025.04.03 文献データベース