Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16 2019.09.16 2025.04.03 文献データベース
A Convolutional Transformation Network for Malware Classification Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16 2019.09.16 2025.04.03 文献データベース
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16 2019.09.16 2025.04.03 文献データベース
Node Injection Attacks on Graphs via Reinforcement Learning Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14 2019.09.14 2025.04.03 文献データベース
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 2019.09.13 2025.04.03 文献データベース
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 2019.09.13 2025.04.03 文献データベース
On the Hardness of Robust Classification Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2019-09-12 2019.09.12 2025.04.03 文献データベース
Machine Learning in/for Blockchain: Future and Challenges Authors: Fang Chen, Hong Wan, Hua Cai, Guang Cheng | Published: 2019-09-12 | Updated: 2020-12-08 2019.09.12 2025.04.03 文献データベース
An Empirical Investigation of Randomized Defenses against Adversarial Attacks Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12 2019.09.12 2025.04.03 文献データベース
Inspecting adversarial examples using the Fisher information Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12 2019.09.12 2025.04.03 文献データベース