Efficient and Transferable Adversarial Examples from Bayesian Neural Networks Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18 2020.11.10 2025.04.03 文献データベース
The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06 2020.11.08 2025.04.03 文献データベース
On the Privacy Risks of Algorithmic Fairness Authors: Hongyan Chang, Reza Shokri | Published: 2020-11-07 | Updated: 2021-04-07 2020.11.07 2025.04.03 文献データベース
Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya | Published: 2020-11-03 | Updated: 2021-10-02 2020.11.03 2025.04.03 文献データベース
Adversarial Examples in Constrained Domains Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09 2020.11.02 2025.04.03 文献データベース
End-to-end anti-spoofing with RawNet2 Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16 2020.11.02 2025.04.03 文献データベース
On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications Authors: Chengshuai Shi, Cong Shen | Published: 2020-11-02 | Updated: 2021-04-24 2020.11.02 2025.04.03 文献データベース
Differentially Private ADMM Algorithms for Machine Learning Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31 2020.10.31 2025.04.03 文献データベース
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30 2020.10.30 2025.04.03 文献データベース
Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme Authors: Kunjal Panchal | Published: 2020-10-29 2020.10.29 2025.04.03 文献データベース