Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28 2020.01.28 2025.04.03 文献データベース
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis Authors: William Briguglio, Sherif Saad | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08 2020.01.27 2025.04.03 文献データベース
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27 2020.01.27 2025.04.03 文献データベース
Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26 2020.01.26 2025.04.03 文献データベース
Secondary Use of Electronic Health Record: Opportunities and Challenges Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26 2020.01.26 2025.04.03 文献データベース
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack Authors: Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang | Published: 2020-01-24 2020.01.24 2025.04.03 文献データベース
On the human evaluation of audio adversarial examples Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12 2020.01.23 2025.04.03 文献データベース
Adversarial Attack on Community Detection by Hiding Individuals Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22 2020.01.22 2025.04.03 文献データベース