Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 2024.09.06 2025.04.03 文献データベース
Exploring User Privacy Awareness on GitHub: An Empirical Study Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10 2024.09.06 2025.04.03 文献データベース
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05 2024.09.05 2025.04.03 文献データベース
Robust Q-Learning under Corrupted Rewards Authors: Sreejeet Maity, Aritra Mitra | Published: 2024-09-05 2024.09.05 2025.04.03 文献データベース
Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection Authors: Li Yang, Abdallah Shami | Published: 2024-09-05 2024.09.05 2025.04.03 文献データベース
Well, that escalated quickly: The Single-Turn Crescendo Attack (STCA) Authors: Alan Aqrawi, Arian Abbasi | Published: 2024-09-04 | Updated: 2024-09-10 2024.09.04 2025.04.03 文献データベース
Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2024-09-04 2024.09.04 2025.04.03 文献データベース
Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19 2024.09.04 2025.04.03 文献データベース
AdvSecureNet: A Python Toolkit for Adversarial Machine Learning Authors: Melih Catal, Manuel Günther | Published: 2024-09-04 2024.09.04 2025.04.03 文献データベース
Adversarial Attacks on Machine Learning-Aided Visualizations Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24 2024.09.04 2025.04.03 文献データベース