Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 2018.03.02 2025.04.03 文献データベース
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02 2018.03.02 2025.04.03 文献データベース
Data mining for detecting Bitcoin Ponzi schemes Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01 2018.03.01 2025.04.03 文献データベース
Online Feature Ranking for Intrusion Detection Systems Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15 2018.03.01 2025.04.03 文献データベース
Predictive Uncertainty Estimation via Prior Networks Authors: Andrey Malinin, Mark Gales | Published: 2018-02-28 | Updated: 2018-11-29 2018.02.28 2025.04.03 文献データベース
Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 2018.02.27 2025.04.03 文献データベース
Generalized Byzantine-tolerant SGD Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23 2018.02.27 2025.04.03 文献データベース
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 2018.02.27 2025.04.03 文献データベース
Robust GANs against Dishonest Adversaries Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10 2018.02.27 2025.04.03 文献データベース
On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27 2018.02.27 2025.04.03 文献データベース