Side-Channel Aware Fuzzing Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14 2019.08.14 2025.04.03 文献データベース
Interpretable Encrypted Searchable Neural Networks Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14 2019.08.14 2025.04.03 文献データベース
Trustable and Automated Machine Learning Running with Blockchain and Its Applications Authors: Tao Wang, Xinmin Wu, Taiping He | Published: 2019-08-14 2019.08.14 2025.04.03 文献データベース
On Defending Against Label Flipping Attacks on Malware Detection Systems Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16 2019.08.13 2025.04.03 文献データベース
Automatic Model Monitoring for Data Streams Authors: Fábio Pinto, Marco O. P. Sampaio, Pedro Bizarro | Published: 2019-08-12 2019.08.12 2025.04.03 文献データベース
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29 2019.08.12 2025.04.03 文献データベース
Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18 2019.08.12 2025.04.03 文献データベース
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09 2019.08.09 2025.04.03 文献データベース
On the Adversarial Robustness of Neural Networks without Weight Transport Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03 2019.08.09 2025.04.03 文献データベース
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 2019.08.09 2025.04.03 文献データベース