The Privacy Onion Effect: Memorization is Relative Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22 2022.06.21 2025.04.03 文献データベース
The Role of Machine Learning in Cybersecurity Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20 2022.06.20 2025.04.03 文献データベース
On the Role of Generalization in Transferability of Adversarial Examples Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18 2022.06.18 2025.04.03 文献データベース
Adversarial Robustness is at Odds with Lazy Training Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17 2022.06.18 2025.04.03 文献データベース
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06 2022.06.16 2025.04.03 文献データベース
Deepfake histological images for enhancing digital pathology Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16 2022.06.16 2025.04.03 文献データベース
On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16 2022.06.16 2025.04.03 文献データベース
When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16 2022.06.16 2025.04.03 文献データベース
BlindFL: Vertical Federated Machine Learning without Peeking into Your Data Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui | Published: 2022-06-16 2022.06.16 2025.04.03 文献データベース
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 2022.06.15 2025.04.03 文献データベース