RORL: Robust Offline Reinforcement Learning via Conservative Smoothing Authors: Rui Yang, Chenjia Bai, Xiaoteng Ma, Zhaoran Wang, Chongjie Zhang, Lei Han | Published: 2022-06-06 | Updated: 2022-10-22 2022.06.06 2025.04.03 文献データベース
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2022-06-06 2022.06.06 2025.04.03 文献データベース
Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 2022.06.06 2025.04.03 文献データベース
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 2022.06.04 2025.04.03 文献データベース
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 2022.06.02 2025.04.03 文献データベース
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース
Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20 2022.06.01 2025.04.03 文献データベース
Differentially Private Shapley Values for Data Evaluation Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 2022.06.01 2025.04.03 文献データベース
Privacy for Free: How does Dataset Condensation Help Privacy? Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース