KiloGrams: Very Large N-Grams for Malware Classification Authors: Edward Raff, William Fleming, Richard Zak, Hyrum Anderson, Bill Finlayson, Charles Nicholas, Mark McLean | Published: 2019-08-01 KiloGramアルゴリズムPEマルウェア分類特徴重要度分析 2019.08.01 2025.04.03 文献データベース
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04 敵対的学習物理層セキュリティ通信モデル 2019.08.01 2025.04.03 文献データベース
Optimal Attacks on Reinforcement Learning Policies Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31 プライバシー保護技術敵対的訓練深層強化学習 2019.07.31 2025.04.03 文献データベース
Time Series Analysis of Big Data for Electricity Price and Demand to Find Cyber-Attacks part 2: Decomposition Analysis Authors: Mohsen Rakhshandehroo, Mohammad Rajabdorri | Published: 2019-07-30 時系列分析時間系列分析統計的仮説検定 2019.07.30 2025.04.03 文献データベース
Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation Authors: Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen | Published: 2019-07-30 | Updated: 2019-09-09 プライバシー保護メカニズムプライバシー管理正則化 2019.07.30 2025.04.03 文献データベース
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 医療画像分析敵対的サンプル敵対的訓練 2019.07.30 2025.04.03 文献データベース
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 攻撃の分類敵対的サンプル敵対的学習 2019.07.30 2025.04.03 文献データベース
Nonconvex Zeroth-Order Stochastic ADMM Methods with Lower Function Query Complexity Authors: Feihu Huang, Shangqian Gao, Jian Pei, Heng Huang | Published: 2019-07-30 | Updated: 2023-12-11 SGDの特性多目的最適化損失関数 2019.07.30 2025.04.03 文献データベース
A Deep Learning Based Attack for The Chaos-based Image Encryption Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29 データ保護手法損失関数暗号プロトコル 2019.07.29 2025.04.03 文献データベース
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran | Published: 2019-07-28 攻撃の分類敵対的サンプル敵対的訓練 2019.07.28 2025.04.03 文献データベース