Foolbox: A Python toolbox to benchmark the robustness of machine learning models Authors: Jonas Rauber, Wieland Brendel, Matthias Bethge | Published: 2017-07-13 | Updated: 2018-03-20 2017.07.13 2025.04.03 文献データベース
Process Monitoring on Sequences of System Call Count Vectors Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12 2017.07.12 2025.04.03 文献データベース
NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12 2017.07.12 2025.04.03 文献データベース
A Survey on Resilient Machine Learning Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11 2017.07.11 2025.04.03 文献データベース
A Machine Learning Based Intrusion Detection System for Software Defined 5G Network Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10 2017.07.10 2025.04.03 文献データベース
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30 2017.06.30 2025.04.03 文献データベース
Towards Deep Learning Models Resistant to Adversarial Attacks Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04 2017.06.19 2025.04.03 文献データベース
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31 2017.06.13 2025.04.03 文献データベース
Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway Authors: Veronica del Carmen Estrada | Published: 2017-06-10 2017.06.10 2025.04.03 文献データベース
Certified Defenses for Data Poisoning Attacks Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24 2017.06.09 2025.04.03 文献データベース