An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04 2022.10.03 2025.04.03 文献データベース
Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17 2022.10.03 2025.04.03 文献データベース
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 2022.10.01 2025.04.03 文献データベース
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01 2022.10.01 2025.04.03 文献データベース
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01 2022.09.30 2025.04.03 文献データベース
Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning Authors: Ranwa Al Mallah, David Lopez | Published: 2022-09-30 2022.09.30 2025.04.03 文献データベース
Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 2022.09.29 2025.04.03 文献データベース
No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy” Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29 2022.09.29 2025.04.03 文献データベース
Anomaly localization for copy detection patterns through print estimations Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29 2022.09.29 2025.04.03 文献データベース
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30 2022.09.28 2025.04.03 文献データベース