Can’t you hear me knocking: Identification of user actions on Android apps via traffic analysis Authors: Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde | Published: 2014-07-29 2014.07.29 文献データベース
TweetCred: Real-Time Credibility Assessment of Content on Twitter Authors: Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, Patrick Meier | Published: 2014-05-21 | Updated: 2015-01-30 2014.05.21 文献データベース
Graph-based Anomaly Detection and Description: A Survey Authors: Leman Akoglu, Hanghang Tong, Danai Koutra | Published: 2014-04-18 | Updated: 2014-04-28 2014.04.18 文献データベース
Unsupervised Anomaly-based Malware Detection using Hardware Features Authors: Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo | Published: 2014-03-07 | Updated: 2014-03-28 2014.03.07 文献データベース
Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy Authors: Nyagudi Musandu Nyagudi | Published: 2014-02-10 2014.02.10 文献データベース
Collaborative Receptive Field Learning Authors: Shu Kong, Zhuolin Jiang, Qiang Yang | Published: 2014-02-02 2014.02.02 文献データベース
Security Evaluation of Support Vector Machines in Adversarial Environments Authors: Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli | Published: 2014-01-30 2014.01.30 文献データベース
Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps Authors: Karen Simonyan, Andrea Vedaldi, Andrew Zisserman | Published: 2013-12-20 | Updated: 2014-04-19 2013.12.20 文献データベース
Machine Learning Techniques for Intrusion Detection Authors: Mahdi Zamani, Mahnush Movahedi | Published: 2013-12-08 | Updated: 2015-05-09 2013.12.08 文献データベース
Visualizing and Understanding Convolutional Networks Authors: Matthew D Zeiler, Rob Fergus | Published: 2013-11-12 | Updated: 2013-11-28 2013.11.12 文献データベース