Stronger Data Poisoning Attacks Break Data Sanitization Defenses Authors: Pang Wei Koh, Jacob Steinhardt, Percy Liang | Published: 2018-11-02 | Updated: 2021-12-03 2018.11.02 2025.04.03 文献データベース
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02 2018.11.02 2025.04.03 文献データベース
Exposing Deep Fakes Using Inconsistent Head Poses Authors: Xin Yang, Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2018-11-13 2018.11.01 2025.04.03 文献データベース
Exposing DeepFake Videos By Detecting Face Warping Artifacts Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22 2018.11.01 2025.04.03 文献データベース
Defining a Metric Space of Host Logs and Operational Use Cases Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01 2018.11.01 2025.04.03 文献データベース
Auditing Data Provenance in Text-Generation Models Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17 2018.11.01 2025.04.03 文献データベース
Excessive Invariance Causes Adversarial Vulnerability Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12 2018.11.01 2025.04.03 文献データベース
Conditionals in Homomorphic Encryption and Machine Learning Applications Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09 2018.10.29 2025.04.03 文献データベース
Logit Pairing Methods Can Fool Gradient-Based Attacks Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12 2018.10.29 2025.04.03 文献データベース
Rademacher Complexity for Adversarially Robust Generalization Authors: Dong Yin, Kannan Ramchandran, Peter Bartlett | Published: 2018-10-29 | Updated: 2020-07-29 2018.10.29 2025.04.03 文献データベース