What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03 2018.05.03 2025.04.03 文献データベース
How Robust are Deep Neural Networks? Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30 2018.04.30 2025.04.03 文献データベース
t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11 2018.04.25 2025.04.03 文献データベース
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03 2018.04.23 2025.04.03 文献データベース
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 2018.04.23 2025.04.03 文献データベース
MEADE: Towards a Malicious Email Attachment Detection Engine Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22 2018.04.22 2025.04.03 文献データベース
Is feature selection secure against training data poisoning? Authors: Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli | Published: 2018-04-21 2018.04.21 2025.04.03 文献データベース
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 2018.04.21 2025.04.03 文献データベース
Learning More Robust Features with Adversarial Training Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20 2018.04.20 2025.04.03 文献データベース
A Study on Overfitting in Deep Reinforcement Learning Authors: Chiyuan Zhang, Oriol Vinyals, Remi Munos, Samy Bengio | Published: 2018-04-18 | Updated: 2018-04-20 2018.04.18 2025.04.03 文献データベース