Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25 2017.08.25 2025.04.03 文献データベース
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29 2017.08.21 2025.04.03 文献データベース
Evasion Attacks against Machine Learning at Test Time Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli | Published: 2017-08-21 2017.08.21 2025.04.03 文献データベース
Secure Search on the Cloud via Coresets and Sketches Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19 2017.08.19 2025.04.03 文献データベース
Learning Universal Adversarial Perturbations with Generative Models Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05 2017.08.17 2025.04.03 文献データベース
Continuous User Authentication via Unlabeled Phone Movement Patterns Authors: Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha | Published: 2017-08-15 2017.08.15 2025.04.03 文献データベース
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 2017.08.14 2025.04.03 文献データベース
Cascade Adversarial Machine Learning Regularized with a Unified Embedding Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17 2017.08.08 2025.04.03 文献データベース
Fake News Detection on Social Media: A Data Mining Perspective Authors: Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu | Published: 2017-08-07 | Updated: 2017-09-03 2017.08.07 2025.04.03 文献データベース
Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01 2017.08.01 2025.04.03 文献データベース