Adversarial Examples: Opportunities and Challenges Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23 2018.09.13 2025.04.03 文献データベース
Deep Learning in Information Security Authors: Stefan Thaler, Vlado Menkovski, Milan Petkovic | Published: 2018-09-12 2018.09.12 2025.04.03 文献データベース
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 2018.09.11 2025.04.03 文献データベース
PUF-AES-PUF: a novel PUF architecture against non-invasive attacks Authors: Weize Yu, Jia Chen | Published: 2018-09-11 2018.09.11 2025.04.03 文献データベース
Universal Multi-Party Poisoning Attacks Authors: Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed | Published: 2018-09-10 | Updated: 2021-11-10 2018.09.10 2025.04.03 文献データベース
Privacy-Preserving Deep Learning via Weight Transmission Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12 2018.09.10 2025.04.03 文献データベース
Certified Adversarial Robustness with Additive Noise Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2018-09-10 | Updated: 2019-11-10 2018.09.10 2025.04.03 文献データベース
The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure Authors: Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody | Published: 2018-09-09 | Updated: 2018-11-06 2018.09.09 2025.04.03 文献データベース
Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 2018.09.09 2025.04.03 文献データベース
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples Authors: Dan Peng, Zizhan Zheng, Xiaofeng Zhang | Published: 2018-09-08 | Updated: 2018-12-22 2018.09.08 2025.04.03 文献データベース