Who’s Afraid of Adversarial Transferability? Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06 2021.05.02 2025.04.03 文献データベース
AirMixML: Over-the-Air Data Mixup for Inherently Privacy-Preserving Edge Machine Learning Authors: Yusuke Koda, Jihong Park, Mehdi Bennis, Praneeth Vepakomma, Ramesh Raskar | Published: 2021-05-02 2021.05.02 2025.04.03 文献データベース
Privacy and Integrity Preserving Training Using Trusted Hardware Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2021-05-01 2021.05.01 2025.04.03 文献データベース
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07 2021.05.01 2025.04.03 文献データベース
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 2021.04.30 2025.04.03 文献データベース
Improved Matrix Gaussian Mechanism for Differential Privacy Authors: Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang | Published: 2021-04-30 2021.04.30 2025.04.03 文献データベース
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27 2021.04.27 2025.04.03 文献データベース
Metamorphic Detection of Repackaged Malware Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27 2021.04.27 2025.04.03 文献データベース
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27 2021.04.27 2025.04.03 文献データベース
Exploiting Explanations for Model Inversion Attacks Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14 2021.04.26 2025.04.03 文献データベース