Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06 2021.10.05 2025.04.03 文献データベース
Label differential privacy via clustering Authors: Hossein Esfandiari, Vahab Mirrokni, Umar Syed, Sergei Vassilvitskii | Published: 2021-10-05 2021.10.05 2025.04.03 文献データベース
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05 2021.10.05 2025.04.03 文献データベース
Mobile authentication of copy detection patterns: how critical is to know fakes? Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 2021.10.05 2025.04.03 文献データベース
Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation Authors: Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari | Published: 2021-10-05 2021.10.05 2025.04.03 文献データベース
An energy-based model for neuro-symbolic reasoning on knowledge graphs Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04 2021.10.04 2025.04.03 文献データベース
Automating Privilege Escalation with Deep Reinforcement Learning Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04 2021.10.04 2025.04.03 文献データベース
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 2021.10.04 2025.04.03 文献データベース
SecFL: Confidential Federated Learning using TEEs Authors: Do Le Quoc, Christof Fetzer | Published: 2021-10-03 | Updated: 2021-10-07 2021.10.03 2025.04.03 文献データベース
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03 2021.10.03 2025.04.03 文献データベース