Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work Authors: Somdip Dey | Published: 2018-06-14 2018.06.14 2025.04.03 文献データベース
Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data Authors: Jacson Rodrigues Correia-Silva, Rodrigo F. Berriel, Claudine Badue, Alberto F. de Souza, Thiago Oliveira-Santos | Published: 2018-06-14 2018.06.14 2025.04.03 文献データベース
Manifold Mixup: Better Representations by Interpolating Hidden States Authors: Vikas Verma, Alex Lamb, Christopher Beckham, Amir Najafi, Ioannis Mitliagkas, Aaron Courville, David Lopez-Paz, Yoshua Bengio | Published: 2018-06-13 | Updated: 2019-05-11 2018.06.13 2025.04.03 文献データベース
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12 2018.06.12 2025.04.03 文献データベース
Defense Against the Dark Arts: An overview of adversarial example security research and future research directions Authors: Ian Goodfellow | Published: 2018-06-11 2018.06.11 2025.04.03 文献データベース
An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-06-11 2018.06.11 2025.04.03 文献データベース
TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service Authors: Amartya Sanyal, Matt J. Kusner, Adrià Gascón, Varun Kanade | Published: 2018-06-09 2018.06.09 2025.04.03 文献データベース
Data Synthesis based on Generative Adversarial Networks Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02 2018.06.09 2025.04.03 文献データベース
Discovering Signals from Web Sources to Predict Cyber Attacks Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08 2018.06.08 2025.04.03 文献データベース
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27 2018.06.08 2025.04.03 文献データベース