Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15 2021.03.15 2025.04.03 文献データベース
Quantum federated learning through blind quantum computing Authors: Weikang Li, Sirui Lu, Dong-Ling Deng | Published: 2021-03-15 | Updated: 2021-09-02 2021.03.15 2025.04.03 文献データベース
Simeon — Secure Federated Machine Learning Through Iterative Filtering Authors: Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino | Published: 2021-03-13 2021.03.13 2025.04.03 文献データベース
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 2021.03.12 2025.04.03 文献データベース
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson | Published: 2021-03-12 2021.03.12 2025.04.03 文献データベース
Adversarial attacks in consensus-based multi-agent reinforcement learning Authors: Martin Figura, Krishna Chaitanya Kosaraju, Vijay Gupta | Published: 2021-03-11 2021.03.11 2025.04.03 文献データベース
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11 2021.03.11 2025.04.03 文献データベース
BODAME: Bilevel Optimization for Defense Against Model Extraction Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11 2021.03.11 2025.04.03 文献データベース
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17 2021.03.11 2025.04.03 文献データベース
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 2021.03.10 2025.04.03 文献データベース