Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14 2020.12.02 2025.04.03 文献データベース
A Chatbot for Information Security Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01 2020.12.01 2025.04.03 文献データベース
Cyber-Attack Consequence Prediction Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02 2020.12.01 2025.04.03 文献データベース
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer Authors: Joni Korpihalkola, Tuomo Sipola, Samir Puuska, Tero Kokkonen | Published: 2020-12-01 | Updated: 2021-11-02 2020.12.01 2025.04.03 文献データベース
Towards a Universal Features Set for IoT Botnet Attacks Detection Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01 2020.12.01 2025.04.03 文献データベース
Twitter Spam Detection: A Systematic Review Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01 2020.11.30 2025.04.03 文献データベース
TransMIA: Membership Inference Attacks Using Transfer Shadow Training Authors: Seira Hidano, Takao Murakami, Yusuke Kawamoto | Published: 2020-11-30 | Updated: 2021-04-23 2020.11.30 2025.04.03 文献データベース
Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01 2020.11.30 2025.04.03 文献データベース
Voting based ensemble improves robustness of defensive models Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28 2020.11.28 2025.04.03 文献データベース
InstaHide’s Sample Complexity When Mixing Two Private Images Authors: Baihe Huang, Zhao Song, Runzhou Tao, Junze Yin, Ruizhe Zhang, Danyang Zhuo | Published: 2020-11-24 | Updated: 2024-02-06 2020.11.24 2025.04.03 文献データベース