Fusion of ANN and SVM Classifiers for Network Attack Detection Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10 2018.01.09 2025.04.03 文献データベース
Spatially Transformed Adversarial Examples Authors: Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2018-01-09 2018.01.08 2025.04.03 文献データベース
Generating Adversarial Examples with Adversarial Networks Authors: Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2019-02-14 2018.01.08 2025.04.03 文献データベース
Evaluation of Machine Learning Algorithms for Intrusion Detection System Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08 2018.01.08 2025.04.03 文献データベース
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08 2018.01.08 2025.04.03 文献データベース
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 2018.01.06 2025.04.03 文献データベース
A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05 2018.01.05 2025.04.03 文献データベース
Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice? Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05 2018.01.05 2025.04.03 文献データベース
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13 2018.01.03 2025.04.03 文献データベース
Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 2018.01.02 2025.04.03 文献データベース