Model extraction from counterfactual explanations Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03 2020.09.03 2025.04.03 文献データベース
Cost-aware Feature Selection for IoT Device Classification Authors: Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy | Published: 2020-09-02 | Updated: 2021-04-21 2020.09.02 2025.04.03 文献データベース
Yet Meta Learning Can Adapt Fast, It Can Also Break Easily Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02 2020.09.02 2025.04.03 文献データベース
Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05 2020.09.02 2025.04.03 文献データベース
A Survey on Negative Transfer Authors: Wen Zhang, Lingfei Deng, Lei Zhang, Dongrui Wu | Published: 2020-09-02 | Updated: 2021-08-09 2020.09.02 2025.04.03 文献データベース
Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15 2020.09.02 2025.04.03 文献データベース
Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01 2020.09.01 2025.04.03 文献データベース
MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27 2020.09.01 2025.04.03 文献データベース
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31 2020.08.31 2025.04.03 文献データベース
Imitation Privacy Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30 2020.08.30 2025.04.03 文献データベース