Universal Lipschitz Approximation in Bounded Depth Neural Networks Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09 2019.04.09 2025.04.03 文献データベース
Private Hierarchical Clustering and Efficient Approximation Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01 2019.04.09 2025.04.03 文献データベース
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 2019.04.08 2025.04.03 文献データベース
Malware Evasion Attack and Defense Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16 2019.04.07 2025.04.03 文献データベース
Reframing Threat Detection: Inside esINSIDER Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07 2019.04.07 2025.04.03 文献データベース
A Compendium on Network and Host based Intrusion Detection Systems Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06 2019.04.06 2025.04.03 文献データベース
A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05 2019.04.05 2025.04.03 文献データベース
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 2019.04.05 2025.04.03 文献データベース
Malware Detection using Machine Learning and Deep Learning Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04 2019.04.04 2025.04.03 文献データベース
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04 2019.04.04 2025.04.03 文献データベース