Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05 2022.03.05 2025.04.03 文献データベース
Mobile authentication of copy detection patterns Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18 2022.03.04 2025.04.03 文献データベース
Training language models to follow instructions with human feedback Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04 2022.03.04 2025.04.03 文献データベース
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 2022.03.04 2025.04.03 文献データベース
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 2022.03.04 2025.04.03 文献データベース
Differentially Private Label Protection in Split Learning Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04 2022.03.04 2025.04.03 文献データベース
Why adversarial training can hurt robust accuracy Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03 2022.03.03 2025.04.03 文献データベース
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25 2022.03.02 2025.04.03 文献データベース
Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 2022.03.02 2025.04.03 文献データベース
PUMA: Performance Unchanged Model Augmentation for Training Data Removal Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02 2022.03.02 2025.04.03 文献データベース