Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29 2022.06.29 2025.04.03 文献データベース
A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 2022.06.29 2025.04.03 文献データベース
CoAP-DoS: An IoT Network Intrusion Dataset Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29 2022.06.29 2025.04.03 文献データベース
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 2022.06.28 2025.04.03 文献データベース
Parallel Instance Filtering for Malware Detection Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28 2022.06.28 2025.04.03 文献データベース
Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs Authors: Chang Sun, Johan van Soest, Michel Dumontier | Published: 2022-06-28 2022.06.28 2025.04.03 文献データベース
Multifamily Malware Models Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27 2022.06.27 2025.04.03 文献データベース
Adversarially Robust PAC Learnability of Real-Valued Functions Authors: Idan Attias, Steve Hanneke | Published: 2022-06-26 | Updated: 2024-05-05 2022.06.26 2025.04.03 文献データベース
Malware Detection and Prevention using Artificial Intelligence Techniques Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26 2022.06.26 2025.04.03 文献データベース
Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25 2022.06.25 2025.04.03 文献データベース