Time Series Analysis of Big Data for Electricity Price and Demand to Find Cyber-Attacks part 2: Decomposition Analysis Authors: Mohsen Rakhshandehroo, Mohammad Rajabdorri | Published: 2019-07-30 2019.07.30 2025.04.03 文献データベース
Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation Authors: Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen | Published: 2019-07-30 | Updated: 2019-09-09 2019.07.30 2025.04.03 文献データベース
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 2019.07.30 2025.04.03 文献データベース
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 2019.07.30 2025.04.03 文献データベース
Nonconvex Zeroth-Order Stochastic ADMM Methods with Lower Function Query Complexity Authors: Feihu Huang, Shangqian Gao, Jian Pei, Heng Huang | Published: 2019-07-30 | Updated: 2023-12-11 2019.07.30 2025.04.03 文献データベース
A Deep Learning Based Attack for The Chaos-based Image Encryption Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29 2019.07.29 2025.04.03 文献データベース
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran | Published: 2019-07-28 2019.07.28 2025.04.03 文献データベース
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28 2019.07.28 2025.04.03 文献データベース
Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03 2019.07.27 2025.04.03 文献データベース
An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01 2019.07.27 2025.04.03 文献データベース