A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 モデル設計敵対的攻撃検出最適化戦略 2022.09.13 2025.04.03 文献データベース
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 モデル設計侵入検知システム機械学習手法 2022.09.12 2025.04.03 文献データベース
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 DNN IP保護手法プライバシー分析モデル設計 2022.09.12 2025.04.03 文献データベース
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 モデル設計敵対的攻撃検出防御メカニズム 2022.09.09 2025.04.03 文献データベース
Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09 プライバシー分析モデル設計通信モデル 2022.09.09 2025.04.03 文献データベース
On Specification-based Cyber-Attack Detection in Smart Grids Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09 エネルギー管理モデル設計侵入検知システム 2022.09.09 2025.04.03 文献データベース
Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20 DNN IP保護手法モデル設計医療モニタリングシステム 2022.09.09 2025.04.03 文献データベース
Differentially Private Stochastic Gradient Descent with Low-Noise Authors: Puyu Wang, Yunwen Lei, Yiming Ying, Ding-Xuan Zhou | Published: 2022-09-09 | Updated: 2023-07-14 プライバシー分析モデル設計収束保証 2022.09.09 2025.04.03 文献データベース
A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04 DNN IP保護手法プライバシー分析モデル設計 2022.09.08 2025.04.03 文献データベース
VulCurator: A Vulnerability-Fixing Commit Detector Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07 モデルの設計や精度モデル設計脆弱性検出 2022.09.07 2025.04.03 文献データベース