Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 バックドア攻撃ポイズニング機械学習 2021.06.16 2025.04.03 文献データベース
Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08 強化学習最適化手法機械学習 2021.06.08 2025.04.03 文献データベース
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07 リスク分析手法敵対的テキスト浄化機械学習 2021.03.03 2025.04.03 文献データベース
Malware Classification with Word Embedding Features Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03 マルチクラス分類メンバーシップ推論機械学習 2021.03.03 2025.04.03 文献データベース
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02 バックドア攻撃攻撃手法機械学習 2020.12.07 2025.04.03 文献データベース
Deep Learning Methods for Credit Card Fraud Detection Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar | Published: 2020-12-07 機械学習自己学習手法重み更新手法 2020.12.07 2025.04.03 文献データベース
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04 機械学習深層学習異常検知アルゴリズム 2020.12.04 2025.04.03 文献データベース
Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14 機械学習異常検出手法通信効率 2020.12.02 2025.04.03 文献データベース
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02 攻撃手法機械学習金融インテリジェンス 2020.10.19 2025.04.03 文献データベース
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19 デバイス識別手法機械学習特徴抽出手法 2020.10.16 2025.04.03 文献データベース