Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24 2021.05.24 2025.04.03 文献データベース
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 2021.05.23 2025.04.03 文献データベース
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 2021.05.23 2025.04.03 文献データベース
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 2021.05.21 2025.04.03 文献データベース
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 2021.05.20 2025.04.03 文献データベース
Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20 2021.05.20 2025.04.03 文献データベース
Simple Transparent Adversarial Examples Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20 2021.05.20 2025.04.03 文献データベース
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08 2021.05.20 2025.04.03 文献データベース
Analyzing Machine Learning Approaches for Online Malware Detection in Cloud Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta | Published: 2021-05-19 2021.05.19 2025.04.03 文献データベース
Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01 2021.05.19 2025.04.03 文献データベース