STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 2019.02.18 2025.04.03 文献データベース
A Little Is Enough: Circumventing Defenses For Distributed Learning Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16 2019.02.16 2025.04.03 文献データベース
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 2019.02.16 2025.04.03 文献データベース
Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16 2019.02.16 2025.04.03 文献データベース
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples? Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14 2019.02.14 2025.04.03 文献データベース
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 2019.02.13 2025.04.03 文献データベース
Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise Authors: Mehrdad Showkatbakhsh, Can Karakus, Suhas Diggavi | Published: 2019-02-13 2019.02.13 2025.04.03 文献データベース
TensorSCONE: A Secure TensorFlow Framework using Intel SGX Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12 2019.02.12 2025.04.03 文献データベース
Adversarial Samples on Android Malware Detection Systems for IoT Systems Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12 2019.02.12 2025.04.03 文献データベース
Applications of Machine Learning in Cryptography: A Survey Authors: Mohammed M. Alani | Published: 2019-02-11 2019.02.11 2025.04.03 文献データベース