A systematic review of fuzzing based on machine learning techniques Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04 2019.08.04 2025.04.03 文献データベース
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks Authors: Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang | Published: 2019-08-03 2019.08.03 2025.04.03 文献データベース
Exploring the Robustness of NMT Systems to Nonsensical Inputs Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28 2019.08.03 2025.04.03 文献データベース
Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals Authors: Sebastian Kleis, Max Rueckmann, Christian G. Schaeffer | Published: 2019-08-02 2019.08.02 2025.04.03 文献データベース
Road Context-aware Intrusion Detection System for Autonomous Cars Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02 2019.08.02 2025.04.03 文献データベース
Black-box Adversarial ML Attack on Modulation Classification Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01 2019.08.01 2025.04.03 文献データベース
KiloGrams: Very Large N-Grams for Malware Classification Authors: Edward Raff, William Fleming, Richard Zak, Hyrum Anderson, Bill Finlayson, Charles Nicholas, Mark McLean | Published: 2019-08-01 2019.08.01 2025.04.03 文献データベース
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04 2019.08.01 2025.04.03 文献データベース
Optimal Attacks on Reinforcement Learning Policies Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31 2019.07.31 2025.04.03 文献データベース
Time Series Analysis of Big Data for Electricity Price and Demand to Find Cyber-Attacks part 2: Decomposition Analysis Authors: Mohsen Rakhshandehroo, Mohammad Rajabdorri | Published: 2019-07-30 2019.07.30 2025.04.03 文献データベース