Unrestricted Adversarial Examples Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22 2018.09.22 2025.04.03 文献データベース
Adversarial Recommendation: Attack of the Learned Fake Users Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21 2018.09.21 2025.04.03 文献データベース
Adversarial Binaries for Authorship Identification Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07 2018.09.21 2025.04.03 文献データベース
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Authors: Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu | Published: 2018-09-21 2018.09.21 2025.04.03 文献データベース
Playing the Game of Universal Adversarial Perturbations Authors: Julien Perolat, Mateusz Malinowski, Bilal Piot, Olivier Pietquin | Published: 2018-09-20 | Updated: 2018-09-25 2018.09.20 2025.04.03 文献データベース
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten | Published: 2018-09-20 2018.09.20 2025.04.03 文献データベース
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18 2018.09.18 2025.04.03 文献データベース
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2018-09-16 2018.09.16 2025.04.03 文献データベース
Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15 2018.09.15 2025.04.03 文献データベース
Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach Authors: Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, Xiaodong Wang | Published: 2018-09-14 2018.09.14 2025.04.03 文献データベース