A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks Authors: Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song | Published: 2018-04-07 2018.04.07 2025.04.03 文献データベース
Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations Authors: Alex Lamb, Jonathan Binas, Anirudh Goyal, Dmitriy Serdyuk, Sandeep Subramanian, Ioannis Mitliagkas, Yoshua Bengio | Published: 2018-04-07 2018.04.07 2025.04.03 文献データベース
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10 2018.04.03 2025.04.03 文献データベース
Resilient Non-Submodular Maximization over Matroid Constraints Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-04-02 | Updated: 2018-12-06 2018.04.02 2025.04.03 文献データベース
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28 2018.04.01 2025.04.03 文献データベース
Adversarial Attacks and Defences Competition Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe | Published: 2018-03-31 2018.03.31 2025.04.03 文献データベース
Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 2018.03.29 2025.04.03 文献データベース
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 2018.03.29 2025.04.03 文献データベース
Defending against Adversarial Images using Basis Functions Transformations Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16 2018.03.28 2025.04.03 文献データベース
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 2018.03.27 2025.04.03 文献データベース