Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24 2022.10.24 2025.04.03 文献データベース
Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 2022.10.24 2025.04.03 文献データベース
Ares: A System-Oriented Wargame Framework for Adversarial ML Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24 2022.10.24 2025.04.03 文献データベース
Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman | Published: 2022-10-23 2022.10.23 2025.04.03 文献データベース
Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04 2022.10.22 2025.04.03 文献データベース
The privacy issue of counterfactual explanations: explanation linkage attacks Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21 2022.10.21 2025.04.03 文献データベース
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 2022.10.21 2025.04.03 文献データベース
Extracted BERT Model Leaks More Information than You Think! Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31 2022.10.21 2025.04.03 文献データベース
New data poison attacks on machine learning classifiers for mobile exfiltration Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20 2022.10.20 2025.04.03 文献データベース
Do Software Security Practices Yield Fewer Vulnerabilities? Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15 2022.10.20 2025.04.03 文献データベース