Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 2018.03.26 2025.04.03 文献データベース
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24 2018.03.24 2025.04.03 文献データベース
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 2018.03.24 2025.04.03 文献データベース
Datasheets for Datasets Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, Kate Crawford | Published: 2018-03-23 | Updated: 2021-12-01 2018.03.23 2025.04.03 文献データベース
Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28 2018.03.23 2025.04.03 文献データベース
Robust Blind Deconvolution via Mirror Descent Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21 2018.03.21 2025.04.03 文献データベース
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 2018.03.21 2025.04.03 文献データベース
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 2018.03.21 2025.04.03 文献データベース
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 2018.03.19 2025.04.03 文献データベース
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 2018.03.18 2025.04.03 文献データベース