Showing 421–440 of 468 results
/ Date/ Name
May 29, 2019Empirically Measuring Concentration: Fundamental Limits on Intrinsic RobustnessMay 25, 2019Adversarial Policies: Attacking Deep Reinforcement LearningMay 15, 2019On Norm-Agnostic Robustness of Adversarial TrainingMay 15, 2019Transferable Clean-Label Poisoning Attacks on Deep Neural NetsApr 29, 2019Adversarial Training for Free!Mar 26, 2019Privacy in trajectory micro-data publishing : a surveyMar 13, 2019ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationFeb 20, 2019Measurement and Analysis of the Bitcoin Networks: A View from Mining PoolsDec 20, 2018Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new toolOct 1, 2018Privado: Practical and Secure DNN Inference with EnclavesJul 2, 2018Adversarial Perturbations Against Real-Time Video Classification SystemsJun 20, 2018Combinatorial Testing for Deep Learning SystemsJun 18, 2018Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep LearningMay 16, 2018Covert Wireless Communications with Active Eavesdropper on AWGN ChannelsApr 13, 2018A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web ContentFeb 22, 2018Options for encoding names for data linking at the Australian Bureau of StatisticsFeb 6, 2018ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain NetworksDec 14, 2017The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference UncertaintyDec 12, 2017Maximum-Likelihood Power-Distortion Monitoring for GNSS Signal AuthenticationDec 4, 2017Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage