Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 2018.03.21 2025.04.03 文献データベース
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 2018.03.19 2025.04.03 文献データベース
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 2018.03.18 2025.04.03 文献データベース
Adversarial Logit Pairing Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16 2018.03.16 2025.04.03 文献データベース
Vulnerability of Deep Learning Authors: Richard Kenway | Published: 2018-03-16 2018.03.16 2025.04.03 文献データベース
Chiron: Privacy-preserving Machine Learning as a Service Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15 2018.03.15 2025.04.03 文献データベース
Machine learning-assisted virtual patching of web applications Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14 2018.03.14 2025.04.03 文献データベース
Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking Authors: Francesco Restuccia, Salvatore D'Oro, Tommaso Melodia | Published: 2018-03-13 | Updated: 2018-06-11 2018.03.13 2025.04.03 文献データベース
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection Authors: Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols | Published: 2018-03-13 2018.03.13 2025.04.03 文献データベース
Automatic Detection of Online Jihadist Hate Speech Authors: Tom De Smedt, Guy De Pauw, Pieter Van Ostaeyen | Published: 2018-03-13 2018.03.13 2025.04.03 文献データベース