Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09 性能評価攻撃の評価機械学習手法 2022.08.09 2025.04.03 文献データベース
DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic Authors: Zhi Liu | Published: 2022-08-08 マルウェア検出手法性能評価通信解析 2022.08.08 2025.04.03 文献データベース
LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01 予測の安定性性能評価機械学習手法 2022.08.05 2025.04.03 文献データベース
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27 データセット生成性能評価機械学習 2022.07.27 2025.04.03 文献データベース
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26 性能評価攻撃手法音声認識プロセス 2022.07.26 2025.04.03 文献データベース
On the Role of Generalization in Transferability of Adversarial Examples Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18 一般化の影響性能評価敵対的サンプル 2022.06.18 2025.04.03 文献データベース
Deepfake histological images for enhancing digital pathology Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16 アルゴリズム医療AIの脅威性能評価 2022.06.16 2025.04.03 文献データベース
On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16 アルゴリズムオンライン意思決定性能評価 2022.06.16 2025.04.03 文献データベース
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 メンバーシップ推論性能評価攻撃検出 2022.05.18 2025.04.03 文献データベース
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 DFLに対する攻撃手法バックドア攻撃性能評価 2022.05.18 2025.04.03 文献データベース