Intrusion Prevention and Detection in Grid Computing – The ALICE Case Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20 2017.04.20 2025.04.03 文献データベース
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic | Published: 2017-04-20 2017.04.20 2025.04.03 文献データベース
Semi-supervised classification for dynamic Android malware detection Authors: Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita | Published: 2017-04-19 2017.04.19 2025.04.03 文献データベース
Universal Adversarial Perturbations Against Semantic Image Segmentation Authors: Jan Hendrik Metzen, Mummadi Chaithanya Kumar, Thomas Brox, Volker Fischer | Published: 2017-04-19 | Updated: 2017-07-31 2017.04.19 2025.04.03 文献データベース
Morpheo: Traceable Machine Learning on Hidden data Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17 2017.04.17 2025.04.03 文献データベース
A Security Monitoring Framework For Virtualization Based HEP Infrastructures Authors: A. Gomez Ramirez, M. Martinez Pedreira, C. Grigoras, L. Betev, C. Lara, U. Kebschull | Published: 2017-04-16 2017.04.16 2025.04.03 文献データベース
The Space of Transferable Adversarial Examples Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-04-11 | Updated: 2017-05-23 2017.04.11 2025.04.03 文献データベース
Optimized Data Pre-Processing for Discrimination Prevention Authors: Flavio P. Calmon, Dennis Wei, Karthikeyan Natesan Ramamurthy, Kush R. Varshney | Published: 2017-04-11 2017.04.11 2025.04.03 文献データベース
Interpretable Explanations of Black Boxes by Meaningful Perturbation Authors: Ruth Fong, Andrea Vedaldi | Published: 2017-04-11 | Updated: 2021-12-03 2017.04.11 2025.04.03 文献データベース
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress) Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10 2017.04.10 2025.04.03 文献データベース