Malware Detection by Eating a Whole EXE Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25 2017.10.25 2025.04.03 文献データベース
One pixel attack for fooling deep neural networks Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17 2017.10.24 2025.04.03 文献データベース
Human-in-the-loop Artificial Intelligence Authors: Fabio Massimo Zanzotto | Published: 2017-10-23 2017.10.23 2025.04.03 文献データベース
Survey of Machine Learning Techniques for Malware Analysis Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni | Published: 2017-10-23 | Updated: 2018-11-26 2017.10.23 2025.04.03 文献データベース
WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22 2017.10.22 2025.04.03 文献データベース
Elliptical modeling and pattern analysis for perturbation models and classfication Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22 2017.10.22 2025.04.03 文献データベース
A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03 2017.10.21 2025.04.03 文献データベース
Solving the “false positives” problem in fraud prediction Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20 2017.10.20 2025.04.03 文献データベース
Learning Differentially Private Recurrent Language Models Authors: H. Brendan McMahan, Daniel Ramage, Kunal Talwar, Li Zhang | Published: 2017-10-18 | Updated: 2018-02-24 2017.10.18 2025.04.03 文献データベース
Boosting Adversarial Attacks with Momentum Authors: Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, Jianguo Li | Published: 2017-10-17 | Updated: 2018-03-22 2017.10.17 2025.04.03 文献データベース