Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 2019.02.08 2025.04.03 文献データベース
Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08 2019.02.08 2025.04.03 文献データベース
A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19 2019.02.07 2025.04.03 文献データベース
Optimizing seed inputs in fuzzing with machine learning Authors: Liang Cheng, Yang Zhang, Yi Zhang, Chen Wu, Zhangtan Li, Yu Fu, Haisheng Li | Published: 2019-02-07 2019.02.07 2025.04.03 文献データベース
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 2019.02.05 2025.04.03 文献データベース
F-BLEAU: Fast Black-box Leakage Estimation Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi | Published: 2019-02-04 | Updated: 2020-10-27 2019.02.04 2025.04.03 文献データベース
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-02-04 | Updated: 2020-05-18 2019.02.04 2025.04.03 文献データベース
Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09 2019.02.01 2025.04.03 文献データベース
The Efficacy of SHIELD under Different Threat Models Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02 2019.02.01 2025.04.03 文献データベース
Robustness Certificates Against Adversarial Examples for ReLU Networks Authors: Sahil Singla, Soheil Feizi | Published: 2019-02-01 | Updated: 2019-02-05 2019.02.01 2025.04.03 文献データベース