Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06 2019.05.06 2025.04.03 文献データベース
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05 2019.05.05 2025.04.03 文献データベース
CharBot: A Simple and Effective Method for Evading DGA Classifiers Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30 2019.05.03 2025.04.03 文献データベース
Locally Differentially Private Naive Bayes Classification Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03 2019.05.03 2025.04.03 文献データベース
Transfer of Adversarial Robustness Between Perturbation Types Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03 2019.05.03 2025.04.03 文献データベース
Generative Adversarial Network for Wireless Signal Spoofing Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07 2019.05.03 2025.04.03 文献データベース
Mimic Learning to Generate a Shareable Network Intrusion Detection Model Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18 2019.05.02 2025.04.03 文献データベース
You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle Authors: Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, Bin Dong | Published: 2019-05-02 | Updated: 2019-11-01 2019.05.02 2025.04.03 文献データベース
Weight Map Layer for Noise and Adversarial Attack Robustness Authors: Mohammed Amer, Tomás Maul | Published: 2019-05-02 | Updated: 2020-12-02 2019.05.02 2025.04.03 文献データベース
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09 2019.05.01 2025.04.03 文献データベース