A Data Science Approach for Honeypot Detection in Ethereum Authors: Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State | Published: 2019-10-03 | Updated: 2019-12-19 2019.10.03 2025.04.03 文献データベース
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung | Published: 2019-10-03 2019.10.03 2025.04.03 文献データベース
Piracy Resistant Watermarks for Deep Neural Networks Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng | Published: 2019-10-02 | Updated: 2020-12-02 2019.10.02 2025.04.03 文献データベース
Attacking Vision-based Perception in End-to-End Autonomous Driving Models Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-10-02 2019.10.02 2025.04.03 文献データベース
Machine-Learning Techniques for Detecting Attacks in SDN Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02 2019.10.02 2025.04.03 文献データベース
Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17 2019.10.02 2025.04.03 文献データベース
Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R | Published: 2019-10-01 2019.10.01 2025.04.03 文献データベース
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01 2019.10.01 2025.04.03 文献データベース
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-10-01 2019.10.01 2025.04.03 文献データベース
Hidden Trigger Backdoor Attacks Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21 2019.09.30 2025.04.03 文献データベース