Combating Adversarial Attacks Using Sparse Representations Authors: Soorya Gopalakrishnan, Zhinus Marzi, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-03-11 | Updated: 2018-07-13 2018.03.11 2025.04.03 文献データベース
Variance Networks: When Expectation Does Not Meet Your Expectations Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18 2018.03.10 2025.04.03 文献データベース
Detecting Adversarial Examples – A Lesson from Multimedia Forensics Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09 2018.03.09 2025.04.03 文献データベース
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09 2018.03.09 2025.04.03 文献データベース
Explaining Black-box Android Malware Detection Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29 2018.03.09 2025.04.03 文献データベース
Generating Artificial Data for Private Deep Learning Authors: Aleksei Triastcyn, Boi Faltings | Published: 2018-03-08 | Updated: 2019-04-28 2018.03.08 2025.04.03 文献データベース
Stochastic Activation Pruning for Robust Adversarial Defense Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05 2018.03.05 2025.04.03 文献データベース
Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 2018.03.02 2025.04.03 文献データベース
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02 2018.03.02 2025.04.03 文献データベース
Data mining for detecting Bitcoin Ponzi schemes Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01 2018.03.01 2025.04.03 文献データベース