Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset Authors: Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi | Published: 2020-01-18 2020.01.18 2025.04.03 文献データベース
IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing Authors: Maurizio Aiello, Enrico Cambiaso, Roberto Canonico, Leonardo Maccari, Marco Mellia, Antonio Pescapè, Ivan Vaccari | Published: 2020-01-17 2020.01.17 2025.04.03 文献データベース
Cyber Attack Detection thanks to Machine Learning Algorithms Authors: Antoine Delplace, Sheryl Hermoso, Kristofer Anandita | Published: 2020-01-17 2020.01.17 2025.04.03 文献データベース
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16 2020.01.16 2025.04.03 文献データベース
A simple way to make neural networks robust against diverse image corruptions Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22 2020.01.16 2025.04.03 文献データベース
Attack based DoS attack detection using multiple classifier Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16 2020.01.16 2025.04.03 文献データベース
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21 2020.01.16 2025.04.03 文献データベース
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14 2020.01.14 2025.04.03 文献データベース
DeepQuarantine for Suspicious Mail Authors: Nikita Benkovich, Roman Dedenok, Dmitry Golubev | Published: 2020-01-13 2020.01.13 2025.04.03 文献データベース
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 2020.01.13 2025.04.03 文献データベース