The Second Order Linear Model Authors: Ming Lin, Shuang Qiu, Bin Hong, Jieping Ye | Published: 2017-03-02 | Updated: 2017-06-23 2017.03.02 文献データベース
Detecting Adversarial Samples from Artifacts Authors: Reuben Feinman, Ryan R. Curtin, Saurabh Shintre, Andrew B. Gardner | Published: 2017-03-01 | Updated: 2017-11-15 2017.03.01 文献データベース
Preserving Differential Privacy Between Features in Distributed Estimation Authors: Christina Heinze-Deml, Brian McWilliams, Nicolai Meinshausen | Published: 2017-03-01 | Updated: 2017-06-27 2017.03.01 文献データベース
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys Authors: Joshua Saxe, Konstantin Berlin | Published: 2017-02-27 2017.02.27 文献データベース
Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses Authors: Giovanni Cherubin | Published: 2017-02-24 | Updated: 2017-08-23 2017.02.24 文献データベース
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning Authors: Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz | Published: 2017-02-24 | Updated: 2017-09-14 2017.02.24 文献データベース
Steganalysis of 3D Objects Using Statistics of Local Feature Sets Authors: Zhenyu Li, Adrian G. Bors | Published: 2017-02-23 2017.02.23 文献データベース
Adversarial examples for generative models Authors: Jernej Kos, Ian Fischer, Dawn Song | Published: 2017-02-22 2017.02.22 文献データベース
On the (Statistical) Detection of Adversarial Examples Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel | Published: 2017-02-21 | Updated: 2017-10-17 2017.02.21 文献データベース
Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN Authors: Weiwei Hu, Ying Tan | Published: 2017-02-20 2017.02.20 文献データベース