Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions Authors: Li Chen | Published: 2019-04-03 2019.04.03 2025.04.03 文献データベース
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28 2019.04.03 2025.04.03 文献データベース
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon | Published: 2019-04-03 2019.04.03 2025.04.03 文献データベース
Active Learning for Network Intrusion Detection Authors: Amir Ziai | Published: 2019-04-02 2019.04.02 2025.04.03 文献データベース
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02 2019.04.02 2025.04.03 文献データベース
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30 2019.04.01 2025.04.03 文献データベース
TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering Authors: Farzam Fanitabasi | Published: 2019-04-01 2019.04.01 2025.04.03 文献データベース
Defending against adversarial attacks by randomized diversification Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01 2019.04.01 2025.04.03 文献データベース
Deep Learning in steganography and steganalysis from 2015 to 2018 Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16 2019.03.31 2025.04.03 文献データベース
On the Vulnerability of CNN Classifiers in EEG-Based BCIs Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31 2019.03.31 2025.04.03 文献データベース