Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 2022.03.04 2025.04.03 文献データベース
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 2022.03.04 2025.04.03 文献データベース
Differentially Private Label Protection in Split Learning Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04 2022.03.04 2025.04.03 文献データベース
Why adversarial training can hurt robust accuracy Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03 2022.03.03 2025.04.03 文献データベース
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25 2022.03.02 2025.04.03 文献データベース
Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 2022.03.02 2025.04.03 文献データベース
PUMA: Performance Unchanged Model Augmentation for Training Data Removal Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02 2022.03.02 2025.04.03 文献データベース
A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01 2022.03.01 2025.04.03 文献データベース
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01 2022.03.01 2025.04.03 文献データベース
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt | Published: 2022-03-01 2022.03.01 2025.04.03 文献データベース