Btech thesis report on adversarial attack detection and purification of adverserially attacked images Authors: Dvij Kalaria | Published: 2022-05-09 攻撃検出敵対的サンプル適応型敵対的訓練 2022.05.09 2025.04.03 文献データベース
On Generalisability of Machine Learning-based Network Intrusion Detection Systems Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09 パフォーマンス評価侵入検知システム攻撃検出 2022.05.09 2025.04.03 文献データベース
A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09 攻撃手法機械学習手法温度条件 2022.05.09 2025.04.03 文献データベース
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16 プライバシー評価ユーザー体験評価攻撃手法 2022.05.08 2025.04.03 文献データベース
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08 パフォーマンス評価侵入検知システム攻撃手法 2022.05.08 2025.04.03 文献データベース
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone | Published: 2022-05-07 ユーザー体験評価ランダムフォレスト性能評価 2022.05.07 2025.04.03 文献データベース
Privacy accounting $\varepsilon$conomics: Improving differential privacy composition via a posteriori bounds Authors: Valentin Hartmann, Vincent Bindschaedler, Alexander Bentkamp, Robert West | Published: 2022-05-06 | Updated: 2023-06-19 ODP分析プライバシー手法プライバシー評価 2022.05.06 2025.04.03 文献データベース
Fusion: Efficient and Secure Inference Resilient to Malicious Servers Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10 プライバシー保護技術攻撃手法通信効率 2022.05.06 2025.04.03 文献データベース
Large Scale Transfer Learning for Differentially Private Image Classification Authors: Harsh Mehta, Abhradeep Thakurta, Alexey Kurakin, Ashok Cutkosky | Published: 2022-05-06 | Updated: 2022-05-20 プライバシー分析プライバシー評価機械学習の応用 2022.05.06 2025.04.03 文献データベース
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05 ロバスト性評価信頼評価モジュール脆弱性分析 2022.05.05 2025.04.03 文献データベース