Vulnerability Prioritization: An Offensive Security Approach Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22 2022.06.22 2025.04.03 文献データベース
Attack Techniques and Threat Identification for Vulnerabilities Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22 2022.06.22 2025.04.03 文献データベース
Multi-party Secure Broad Learning System for Privacy Preserving Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22 2022.06.22 2025.04.03 文献データベース
ROSE: A RObust and SEcure DNN Watermarking Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22 2022.06.22 2025.04.03 文献データベース
A Practical Methodology for ML-Based EM Side Channel Disassemblers Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20 2022.06.21 2025.04.03 文献データベース
sqSGD: Locally Private and Communication Efficient Federated Learning Authors: Yan Feng, Tao Xiong, Ruofan Wu, LingJuan Lv, Leilei Shi | Published: 2022-06-21 | Updated: 2022-06-22 2022.06.21 2025.04.03 文献データベース
The Privacy Onion Effect: Memorization is Relative Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22 2022.06.21 2025.04.03 文献データベース
The Role of Machine Learning in Cybersecurity Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20 2022.06.20 2025.04.03 文献データベース
On the Role of Generalization in Transferability of Adversarial Examples Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18 2022.06.18 2025.04.03 文献データベース
Adversarial Robustness is at Odds with Lazy Training Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17 2022.06.18 2025.04.03 文献データベース