SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke | Published: 2022-03-15 2022.03.15 2025.04.03 文献データベース
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14 2022.03.14 2025.04.03 文献データベース
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14 2022.03.14 2025.04.03 文献データベース
Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13 2022.03.13 2025.04.03 文献データベース
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13 2022.03.13 2025.04.03 文献データベース
One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13 2022.03.13 2025.04.03 文献データベース
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13 2022.03.13 2025.04.03 文献データベース
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11 2022.03.11 2025.04.03 文献データベース
Designing ML-Resilient Locking at Register-Transfer Level Authors: Dominik Sisejkovic, Luca Collini, Benjamin Tan, Christian Pilato, Ramesh Karri, Rainer Leupers | Published: 2022-03-10 | Updated: 2022-04-06 2022.03.10 2025.04.03 文献データベース
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10 2022.03.10 2025.04.03 文献データベース