Dodging Attack Using Carefully Crafted Natural Makeup Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14 2021.09.14 2025.04.03 文献データベース
The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26 2021.09.13 2025.04.03 文献データベース
Deep Generative Models to Extend Active Directory Graphs with Honeypot Users Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13 2021.09.13 2025.04.03 文献データベース
Formalizing and Estimating Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05 2021.09.13 2025.04.03 文献データベース
Differential Privacy in Personalized Pricing with Nonparametric Demand Models Authors: Xi Chen, Sentao Miao, Yining Wang | Published: 2021-09-10 2021.09.10 2025.04.03 文献データベース
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 2021.09.09 2025.04.03 文献データベース
Automated Security Assessment for the Internet of Things Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09 2021.09.09 2025.04.03 文献データベース
Detecting Attacks on IoT Devices using Featureless 1D-CNN Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09 2021.09.09 2025.04.03 文献データベース
Knowledge mining of unstructured information: application to cyber-domain Authors: Tuomas Takko, Kunal Bhattacharya, Martti Lehto, Pertti Jalasvirta, Aapo Cederberg, Kimmo Kaski | Published: 2021-09-08 | Updated: 2022-08-01 2021.09.08 2025.04.03 文献データベース
Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection Authors: Shulai Zhang, Zirui Li, Quan Chen, Wenli Zheng, Jingwen Leng, Minyi Guo | Published: 2021-09-08 2021.09.08 2025.04.03 文献データベース