One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy Authors: Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos | Published: 2018-10-23 2018.10.23 2025.04.03 文献データベース
Sparse DNNs with Improved Adversarial Robustness Authors: Yiwen Guo, Chao Zhang, Changshui Zhang, Yurong Chen | Published: 2018-10-23 | Updated: 2019-11-06 2018.10.23 2025.04.03 文献データベース
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22 2018.10.22 2025.04.03 文献データベース
Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19 2018.10.19 2025.04.03 文献データベース
Exploring Adversarial Examples in Malware Detection Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13 2018.10.18 2025.04.03 文献データベース
Private Machine Learning in TensorFlow using Secure Computation Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23 2018.10.18 2025.04.03 文献データベース
A Training-based Identification Approach to VIN Adversarial Examples Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18 2018.10.18 2025.04.03 文献データベース
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11 2018.10.16 2025.04.03 文献データベース
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09 2018.10.16 2025.04.03 文献データベース
Malware triage for early identification of Advanced Persistent Threat activities Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16 2018.10.16 2025.04.03 文献データベース