Modelling and Quantifying Membership Information Leakage in Machine Learning Authors: Farhad Farokhi, Mohamed Ali Kaafar | Published: 2020-01-29 | Updated: 2020-04-28 2020.01.29 2025.04.03 文献データベース
IoT Behavioral Monitoring via Network Traffic Analysis Authors: Arunan Sivanathan | Published: 2020-01-28 2020.01.28 2025.04.03 文献データベース
Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28 2020.01.28 2025.04.03 文献データベース
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis Authors: William Briguglio, Sherif Saad | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08 2020.01.27 2025.04.03 文献データベース
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26 2020.01.26 2025.04.03 文献データベース
Secondary Use of Electronic Health Record: Opportunities and Challenges Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26 2020.01.26 2025.04.03 文献データベース
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack Authors: Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang | Published: 2020-01-24 2020.01.24 2025.04.03 文献データベース