Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 2018.03.29 2025.04.03 文献データベース
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 2018.03.29 2025.04.03 文献データベース
Defending against Adversarial Images using Basis Functions Transformations Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16 2018.03.28 2025.04.03 文献データベース
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 2018.03.27 2025.04.03 文献データベース
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 2018.03.27 2025.04.03 文献データベース
Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27 2018.03.27 2025.04.03 文献データベース
Bypassing Feature Squeezing by Increasing Adversary Strength Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27 2018.03.27 2025.04.03 文献データベース
Resilient Active Information Gathering with Mobile Robots Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02 2018.03.26 2025.04.03 文献データベース
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26 2018.03.26 2025.04.03 文献データベース
Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 2018.03.26 2025.04.03 文献データベース