Exploiting Unintended Feature Leakage in Collaborative Learning Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01 2018.05.10 2025.04.03 文献データベース
Secure Mobile Edge Computing in IoT via Collaborative Online Learning Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09 2018.05.09 2025.04.03 文献データベース
Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07 2018.05.07 2025.04.03 文献データベース
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12 2018.05.07 2025.04.03 文献データベース
PRADA: Protecting against DNN Model Stealing Attacks Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31 2018.05.07 2025.04.03 文献データベース
Automatic Classification of Object Code Using Machine Learning Authors: John Clemens | Published: 2018-05-06 2018.05.06 2025.04.03 文献データベース
Classification of Epileptic EEG Signals by Wavelet based CFC Authors: Amirmasoud Ahmadi, Mahsa Behroozi, Vahid Shalchyan, Mohammad Reza Daliri | Published: 2018-05-04 2018.05.04 2025.04.03 文献データベース
RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning Authors: Baibhab Chatterjee, Debayan Das, Shovan Maity, Shreyas Sen | Published: 2018-05-03 | Updated: 2018-06-19 2018.05.03 2025.04.03 文献データベース
What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03 2018.05.03 2025.04.03 文献データベース
How Robust are Deep Neural Networks? Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30 2018.04.30 2025.04.03 文献データベース