Attribution-driven Causal Analysis for Detection of Adversarial Examples Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14 2019.03.14 2025.04.03 文献データベース
Machine Learning in IoT Security: Current Solutions and Future Challenges Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14 2019.03.14 2025.04.03 文献データベース
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation Authors: Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang | Published: 2019-03-13 2019.03.13 2025.04.03 文献データベース
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13 2019.03.13 2025.04.03 文献データベース
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12 2019.03.12 2025.04.03 文献データベース
Detection of LDDoS Attacks Based on TCP Connection Parameters Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12 2019.03.12 2025.04.03 文献データベース
Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification Authors: Scott E. Coull, Christopher Gardner | Published: 2019-03-12 | Updated: 2019-03-20 2019.03.12 2025.04.03 文献データベース
Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12 2019.03.12 2025.04.03 文献データベース
Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-10 2019.03.10 2025.04.03 文献データベース
Semantics Preserving Adversarial Learning Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21 2019.03.10 2025.04.03 文献データベース