Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-10 2019.03.10 2025.04.03 文献データベース
Semantics Preserving Adversarial Learning Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21 2019.03.10 2025.04.03 文献データベース
A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08 2019.03.08 2025.04.03 文献データベース
Detection of Advanced Malware by Machine Learning Techniques Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07 2019.03.07 2025.04.03 文献データベース
Adversarial Out-domain Examples for Generative Models Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi | Published: 2019-03-07 | Updated: 2019-05-13 2019.03.07 2025.04.03 文献データベース
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-03-06 2019.03.06 2025.04.03 文献データベース
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens | Published: 2019-03-06 2019.03.06 2025.04.03 文献データベース
Online Data Poisoning Attack Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30 2019.03.05 2025.04.03 文献データベース
Adversarial Examples on Graph Data: Deep Insights into Attack and Defense Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22 2019.03.05 2025.04.03 文献データベース
Complement Objective Training Authors: Hao-Yun Chen, Pei-Hsin Wang, Chun-Hao Liu, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-04 | Updated: 2019-03-21 2019.03.04 2025.04.03 文献データベース