Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 深層学習手法脅威モデリング脆弱性分析 2023.06.01 2025.04.03 文献データベース
Investigating Adversarial Vulnerability and Implicit Bias through Frequency Analysis Authors: Lorenzo Basile, Nikos Karantzas, Alberto D'Onofrio, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2024-07-17 敵対的サンプル敵対的攻撃深層学習手法 2023.05.24 2025.04.03 文献データベース
Expressive Losses for Verified Robustness via Convex Combinations Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18 パラメータ調整機械学習手法深層学習手法 2023.05.23 2025.04.03 文献データベース
Can deepfakes be created by novice users? Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28 検出手法の分析深層学習手法生成モデルの課題 2023.04.28 2025.04.03 文献データベース
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks Authors: Mahnoor Shahid | Published: 2023-04-27 検出手法の分析機械学習手法深層学習手法 2023.04.27 2025.04.03 文献データベース
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP保護手法ポイズニング深層学習手法 2023.03.15 2025.04.03 文献データベース
DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23 AIによる出力の識別テキストの摂動手法深層学習手法 2023.01.26 2025.04.03 文献データベース
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 敵対的サンプル敵対的攻撃手法深層学習手法 2022.10.21 2025.04.03 文献データベース
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 敵対的サンプル敵対的攻撃手法深層学習手法 2022.10.18 2025.04.03 文献データベース
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling Authors: Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang | Published: 2022-10-18 | Updated: 2024-08-01 プライバシー分析プライバシー評価深層学習手法 2022.10.18 2025.04.03 文献データベース