Attacking the Madry Defense Model with $L_1$-based Adversarial Examples Authors: Yash Sharma, Pin-Yu Chen | Published: 2017-10-30 | Updated: 2018-07-27 2017.10.30 2025.04.03 文献データベース
Certifying Some Distributional Robustness with Principled Adversarial Training Authors: Aman Sinha, Hongseok Namkoong, Riccardo Volpi, John Duchi | Published: 2017-10-29 | Updated: 2020-05-01 2017.10.29 2025.04.03 文献データベース
Interpretation of Neural Networks is Fragile Authors: Amirata Ghorbani, Abubakar Abid, James Zou | Published: 2017-10-29 | Updated: 2018-11-06 2017.10.29 2025.04.03 文献データベース
Context-Aware Generative Adversarial Privacy Authors: Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal | Published: 2017-10-26 | Updated: 2017-12-03 2017.10.26 2025.04.03 文献データベース
Maximum Principle Based Algorithms for Deep Learning Authors: Qianxiao Li, Long Chen, Cheng Tai, Weinan E | Published: 2017-10-26 | Updated: 2018-06-02 2017.10.26 2025.04.03 文献データベース
Malware Detection by Eating a Whole EXE Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25 2017.10.25 2025.04.03 文献データベース
One pixel attack for fooling deep neural networks Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17 2017.10.24 2025.04.03 文献データベース
Human-in-the-loop Artificial Intelligence Authors: Fabio Massimo Zanzotto | Published: 2017-10-23 2017.10.23 2025.04.03 文献データベース
Survey of Machine Learning Techniques for Malware Analysis Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni | Published: 2017-10-23 | Updated: 2018-11-26 2017.10.23 2025.04.03 文献データベース
WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22 2017.10.22 2025.04.03 文献データベース