Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09 2022.05.20 2025.04.03 文献データベース
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 2022.05.20 2025.04.03 文献データベース
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 2022.05.19 2025.04.03 文献データベース
Differential Privacy: What is all the noise about? Authors: Roxana Danger | Published: 2022-05-19 2022.05.19 2025.04.03 文献データベース
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
Adaptive Hybrid Heterogeneous IDS for 6LoWPAN Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
Lessons Learned: Defending Against Property Inference Attacks Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09 2022.05.18 2025.04.03 文献データベース
On the (In)security of Peer-to-Peer Decentralized Machine Learning Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10 2022.05.17 2025.04.03 文献データベース