CryptoDL: Deep Neural Networks over Encrypted Data Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14 2017.11.14 2025.04.03 文献データベース
Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples Authors: Jihun Hamm, Akshay Mehra | Published: 2017-11-12 | Updated: 2018-06-27 2017.11.12 2025.04.03 文献データベース
Dynamic Analysis of Executables to Detect and Characterize Malware Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28 2017.11.10 2025.04.03 文献データベース
p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning Authors: Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper | Published: 2017-11-10 | Updated: 2018-04-02 2017.11.10 2025.04.03 文献データベース
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 2017.11.08 2025.04.03 文献データベース
Intriguing Properties of Adversarial Examples Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08 2017.11.08 2025.04.03 文献データベース
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08 2017.11.08 2025.04.03 文献データベース
Contaminant Removal for Android Malware Detection Systems Authors: Lichao Sun, Xiaokai Wei, Jiawei Zhang, Lifang He, Philip S. Yu, Witawas Srisa-an | Published: 2017-11-07 | Updated: 2017-11-14 2017.11.07 2025.04.03 文献データベース
Advanced Analytics for Connected Cars Cyber Security Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08 2017.11.06 2025.04.03 文献データベース
Adversarial Frontier Stitching for Remote Neural Network Watermarking Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07 2017.11.06 2025.04.03 文献データベース