Tackling Android Stego Apps in the Wild Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01 2018.08.01 2025.04.03 文献データベース
Cognitive Techniques for Early Detection of Cybersecurity Events Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01 2018.08.01 2025.04.03 文献データベース
Subsampled Rényi Differential Privacy and Analytical Moments Accountant Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04 2018.07.31 2025.04.03 文献データベース
Security and Privacy Issues in Deep Learning Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10 2018.07.31 2025.04.03 文献データベース
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 2018.07.29 2025.04.03 文献データベース
Rob-GAN: Generator, Discriminator, and Adversarial Attacker Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15 2018.07.27 2025.04.03 文献データベース
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27 2018.07.27 2025.04.03 文献データベース
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27 2018.07.27 2025.04.03 文献データベース
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27 2018.07.27 2025.04.03 文献データベース
Limitations of the Lipschitz constant as a defense against adversarial examples Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25 2018.07.25 2025.04.03 文献データベース