Adversarial Attacks and Defences: A Survey Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28 2018.09.28 2025.04.03 文献データベース
Explainable Black-Box Attacks Against Model-based Authentication Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28 2018.09.28 2025.04.03 文献データベース
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia | Published: 2018-09-27 2018.09.27 2025.04.03 文献データベース
Identification of Wearable Devices with Bluetooth Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley | Published: 2018-09-27 2018.09.27 2025.04.03 文献データベース
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26 2018.09.26 2025.04.03 文献データベース
Neural Networks with Structural Resistance to Adversarial Attacks Authors: Luca de Alfaro | Published: 2018-09-25 2018.09.25 2025.04.03 文献データベース
Fast Geometrically-Perturbed Adversarial Faces Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28 2018.09.24 2025.04.03 文献データベース
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29 2018.09.23 2025.04.03 文献データベース
Unrestricted Adversarial Examples Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22 2018.09.22 2025.04.03 文献データベース
Adversarial Recommendation: Attack of the Learned Fake Users Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21 2018.09.21 2025.04.03 文献データベース