文献データベース

Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks

Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03
堅牢性向上手法
攻撃の評価
敵対的攻撃手法

On the Adversarial Robustness of Subspace Learning

Authors: Fuwei Li, Lifeng Lai, Shuguang Cui | Published: 2019-08-17
数学的概念の定義
敵対的攻撃手法
最適化問題

Adversarial shape perturbations on 3D point clouds

Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23
堅牢性向上手法
攻撃の評価
敵対的攻撃手法

The Next 700 Policy Miners: A Universal Method for Building Policy Miners

Authors: Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin | Published: 2019-08-16 | Updated: 2019-08-27
ポリシーマイニング
汎用ポリシーマイニング手法
確率分布

FSGAN: Subject Agnostic Face Swapping and Reenactment

Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16
データ生成手法
ディープフェイク
モデル評価

Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences

Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15
データ収集
効率評価
特徴エンジニアリング

Side-Channel Aware Fuzzing

Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14
将来の研究
特徴エンジニアリング
評価手法

Interpretable Encrypted Searchable Neural Networks

Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14
プライバシー保護技術
暗号学
計算複雑性

Trustable and Automated Machine Learning Running with Blockchain and Its Applications

Authors: Tao Wang, Xinmin Wu, Taiping He | Published: 2019-08-14
スマートコントラクト
ブロックチェーン
犯罪行為検出

On Defending Against Label Flipping Attacks on Malware Detection Systems

Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16
ポイズニング
敵対的攻撃手法
計算複雑性