An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26 2019.11.26 2025.04.03 文献データベース
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21 2019.11.26 2025.04.03 文献データベース
Defending Against Adversarial Machine Learning Authors: Alison Jenkins | Published: 2019-11-26 2019.11.26 2025.04.03 文献データベース
Assessing Supply Chain Cyber Risks Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26 2019.11.26 2025.04.03 文献データベース
Network Intrusion Detection based on LSTM and Feature Embedding Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26 2019.11.26 2025.04.03 文献データベース
Privacy preserving Neural Network Inference on Encrypted Data with GPUs Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26 2019.11.26 2025.04.03 文献データベース
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25 2019.11.25 2025.04.03 文献データベース
Playing it Safe: Adversarial Robustness with an Abstain Option Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25 2019.11.25 2025.04.03 文献データベース
One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 2019.11.25 2025.04.03 文献データベース
Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25 2019.11.25 2025.04.03 文献データベース