Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 2022.05.15 2025.04.03 文献データベース
Representation learning with function call graph transformations for malware open set recognition Authors: Jingyun Jia, Philip K. Chan | Published: 2022-05-13 | Updated: 2022-07-12 2022.05.13 2025.04.03 文献データベース
On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース
A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data Authors: Nassir Mohammad | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース
Collaborative Drug Discovery: Inference-level Data Protection Perspective Authors: Balazs Pejo, Mina Remeli, Adam Arany, Mathieu Galtier, Gergely Acs | Published: 2022-05-13 | Updated: 2022-06-09 2022.05.13 2025.04.03 文献データベース
DualCF: Efficient Model Extraction Attack from Counterfactual Explanations Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース
A Comprehensive Benchmark Suite for Intel SGX Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 2022.05.12 2025.04.03 文献データベース
Sample Complexity Bounds for Robustly Learning Decision Lists against Evasion Attacks Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2022-05-12 2022.05.12 2025.04.03 文献データベース