Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens | Published: 2019-03-06 2019.03.06 2025.04.03 文献データベース
Online Data Poisoning Attack Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30 2019.03.05 2025.04.03 文献データベース
Adversarial Examples on Graph Data: Deep Insights into Attack and Defense Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22 2019.03.05 2025.04.03 文献データベース
Complement Objective Training Authors: Hao-Yun Chen, Pei-Hsin Wang, Chun-Hao Liu, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-04 | Updated: 2019-03-21 2019.03.04 2025.04.03 文献データベース
PuVAE: A Variational Autoencoder to Purify Adversarial Examples Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02 2019.03.02 2025.04.03 文献データベース
Attacking Graph-based Classification via Manipulating the Graph Structure Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13 2019.03.01 2025.04.03 文献データベース
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01 2019.03.01 2025.04.03 文献データベース
Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning Authors: Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, Ngai-Man Cheung | Published: 2019-03-01 2019.03.01 2025.04.03 文献データベース
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01 2019.03.01 2025.04.03 文献データベース
Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28 2019.02.28 2025.04.03 文献データベース