A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13 2020.10.04 2025.04.03 文献データベース
DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04 2020.10.04 2025.04.03 文献データベース
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04 2020.10.04 2025.04.03 文献データベース
Multi-Step Adversarial Perturbations on Recommender Systems Embeddings Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03 2020.10.03 2025.04.03 文献データベース
Do Wider Neural Networks Really Help Adversarial Robustness? Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14 2020.10.03 2025.04.03 文献データベース
CorrAttack: Black-box Adversarial Attack with Structured Search Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03 2020.10.03 2025.04.03 文献データベース
Query complexity of adversarial attacks Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10 2020.10.02 2025.04.03 文献データベース
An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20 2020.10.02 2025.04.03 文献データベース
Deep learning for time series classification Authors: Hassan Ismail Fawaz | Published: 2020-10-01 2020.10.01 2025.04.03 文献データベース
Bag of Tricks for Adversarial Training Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31 2020.10.01 2025.04.03 文献データベース