RareGAN: Generating Samples for Rare Classes Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20 2022.03.20 2025.04.03 文献データベース
The Dark Side: Security Concerns in Machine Learning for EDA Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20 2022.03.20 2025.04.03 文献データベース
On Robust Prefix-Tuning for Text Classification Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19 2022.03.19 2025.04.03 文献データベース
Privacy-Preserving Reinforcement Learning Beyond Expectation Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18 2022.03.18 2025.04.03 文献データベース
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18 2022.03.18 2025.04.03 文献データベース
AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks Authors: Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili | Published: 2022-03-18 2022.03.18 2025.04.03 文献データベース
Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network Authors: Hai N. Nguyen, Guevara Noubir | Published: 2022-03-18 2022.03.18 2025.04.03 文献データベース
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17 2022.03.17 2025.04.03 文献データベース
SoK: Differential Privacy on Graph-Structured Data Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17 2022.03.17 2025.04.03 文献データベース
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 2022.03.16 2025.04.03 文献データベース