Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data Authors: Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan | Published: 2018-05-31 2018.05.31 2025.04.03 文献データベース
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30 2018.05.30 2025.04.03 文献データベース
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-05-30 2018.05.30 2025.04.03 文献データベース
Android Malware Detection based on Factorization Machine Authors: Chenglin Li, Keith Mills, Rui Zhu, Di Niu, Hongwen Zhang, Husam Kinawi | Published: 2018-05-30 | Updated: 2019-08-13 2018.05.30 2025.04.03 文献データベース
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks Authors: Chun-Chen Tu, Paishun Ting, Pin-Yu Chen, Sijia Liu, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Shin-Ming Cheng | Published: 2018-05-30 | Updated: 2020-01-31 2018.05.30 2025.04.03 文献データベース
Adversarial Noise Attacks of Deep Learning Architectures — Stability Analysis via Sparse Modeled Signals Authors: Yaniv Romano, Aviad Aberdam, Jeremias Sulam, Michael Elad | Published: 2018-05-29 | Updated: 2019-08-05 2018.05.29 2025.04.03 文献データベース
FairGAN: Fairness-aware Generative Adversarial Networks Authors: Depeng Xu, Shuhan Yuan, Lu Zhang, Xintao Wu | Published: 2018-05-28 2018.05.28 2025.04.03 文献データベース
The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30 2018.05.28 2025.04.03 文献データベース
Defending Against Adversarial Attacks by Leveraging an Entire GAN Authors: Gokula Krishnan Santhanam, Paulina Grnarova | Published: 2018-05-27 2018.05.27 2025.04.03 文献データベース
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05 2018.05.26 2025.04.03 文献データベース