On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 2021.05.27 2025.04.03 文献データベース
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 2021.05.26 2025.04.03 文献データベース
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26 2021.05.26 2025.04.03 文献データベース
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 2021.05.25 2025.04.03 文献データベース
Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24 2021.05.24 2025.04.03 文献データベース
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 2021.05.23 2025.04.03 文献データベース
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 2021.05.23 2025.04.03 文献データベース
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 2021.05.21 2025.04.03 文献データベース
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 2021.05.20 2025.04.03 文献データベース
Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20 2021.05.20 2025.04.03 文献データベース