Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior Authors: Vineeth S. Bhaskara, Debanjan Bhattacharyya | Published: 2018-07-19 | Updated: 2018-07-30 2018.07.19 2025.04.03 文献データベース
Sequence to Logic with Copy and Cache Authors: Javid Dadashkarimi, Sekhar Tatikonda | Published: 2018-07-19 2018.07.19 2025.04.03 文献データベース
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding Authors: Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li | Published: 2018-07-18 2018.07.18 2025.04.03 文献データベース
Motivating the Rules of the Game for Adversarial Example Research Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20 2018.07.18 2025.04.03 文献データベース
Efficient Deep Learning on Multi-Source Private Data Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17 2018.07.17 2025.04.03 文献データベース
Online Robust Policy Learning in the Presence of Unknown Adversaries Authors: Aaron J. Havens, Zhanhong Jiang, Soumik Sarkar | Published: 2018-07-16 2018.07.16 2025.04.03 文献データベース
Machine Learning with Membership Privacy using Adversarial Regularization Authors: Milad Nasr, Reza Shokri, Amir Houmansadr | Published: 2018-07-16 2018.07.16 2025.04.03 文献データベース
Time Series Deinterleaving of DNS Traffic Authors: Amir Asiaee, Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee | Published: 2018-07-16 2018.07.16 2025.04.03 文献データベース
NEUZZ: Efficient Fuzzing with Neural Program Smoothing Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12 2018.07.15 2025.04.03 文献データベース
Model Reconstruction from Model Explanations Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13 2018.07.13 2025.04.03 文献データベース