文献データベース

Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model

Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29
リアルタイム推論
特徴抽出手法
画像特徴抽出

Quantum Machine Learning for Malware Classification

Authors: Grégoire Barrué, Tony Quertier | Published: 2023-05-09 | Updated: 2023-06-07
パラメータ調整
機械学習手法
量子ニューラルネットワーク

Differentially Private Attention Computation

Authors: Yeqi Gao, Zhao Song, Xin Yang, Yufa Zhou | Published: 2023-05-08 | Updated: 2024-10-14
DNN IP保護手法
プライバシー評価
自己注意メカニズム

Verifiable Learning for Robust Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza | Published: 2023-05-05 | Updated: 2023-11-11
ランダムフォレスト
敵対的攻撃手法
決定木

Incentivising the federation: gradient-based metrics for data selection and valuation in private decentralised training

Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2023-05-04 | Updated: 2024-04-16
DNN IP保護手法
サンプル複雑性
プライバシー評価

Can Feature Engineering Help Quantum Machine Learning for Malware Detection?

Authors: Ran Liu, Maksim Eren, Charles Nicholas | Published: 2023-05-03 | Updated: 2023-08-09
一般化の影響
量子ビットの特性
量子分類器

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14
ウォーターマーキング
プライバシー評価
特徴抽出手法

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30
サイバーセキュリティ
敵対的攻撃手法
運用シナリオ

Can deepfakes be created by novice users?

Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28
検出手法の分析
深層学習手法
生成モデルの課題

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27
サイバー攻撃
スケジューリング手法
異常検出手法