Secure $k$-ish Nearest Neighbors Classifier Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30 2018.01.22 2025.04.03 文献データベース
IoT Security Techniques Based on Machine Learning Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19 2018.01.19 2025.04.03 文献データベース
Blind De-anonymization Attacks using Social Networks Authors: Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee | Published: 2018-01-17 2018.01.17 2025.04.03 文献データベース
Gazelle: A Low Latency Framework for Secure Neural Network Inference Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16 2018.01.16 2025.04.03 文献データベース
Sparsity-based Defense against Adversarial Attacks on Linear Classifiers Authors: Zhinus Marzi, Soorya Gopalakrishnan, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-01-15 | Updated: 2018-06-19 2018.01.15 2025.04.03 文献データベース
Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks Authors: Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu | Published: 2018-01-15 2018.01.15 2025.04.03 文献データベース
A3T: Adversarially Augmented Adversarial Training Authors: Akram Erraqabi, Aristide Baratin, Yoshua Bengio, Simon Lacoste-Julien | Published: 2018-01-12 2018.01.12 2025.04.03 文献データベース
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08 2018.01.09 2025.04.03 文献データベース
Fusion of ANN and SVM Classifiers for Network Attack Detection Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10 2018.01.09 2025.04.03 文献データベース
Spatially Transformed Adversarial Examples Authors: Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2018-01-09 2018.01.08 2025.04.03 文献データベース