Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Semi-supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model SelectionarXiv.org, 2023-092023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2309.06643Full text available |
|
2 |
Material Type: Article
|
An Extensive Study of Residential Proxies in ChinaarXiv.org, 2022-092022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-nd/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2209.06056Full text available |
|
3 |
Material Type: Article
|
FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation ModelsarXiv.org, 2024-042024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08631Full text available |
|
4 |
Material Type: Article
|
Towards Robust Domain Generation Algorithm ClassificationarXiv.org, 2024-042024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.06236Full text available |
|
5 |
Material Type: Article
|
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift MitigationarXiv.org, 2024-032024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2403.07673Full text available |
|
6 |
Material Type: Article
|
Generating End-to-End Adversarial Examples for Malware Classifiers Using ExplainabilityarXiv.org, 2022-062022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2009.13243Full text available |
|
7 |
Material Type: Article
|
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial ContractsarXiv.org, 2024-022024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2401.07261Full text available |
|
8 |
Material Type: Article
|
A BIC-based Mixture Model Defense against Data Poisoning Attacks on ClassifiersarXiv.org, 2022-052022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2105.13530Full text available |
|
9 |
Material Type: Article
|
User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity MeasurementarXiv.org, 2023-122023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2312.10273Full text available |
|
10 |
Material Type: Article
|
Universal adversarial perturbations for multiple classification tasks with quantum classifiersarXiv.org, 2023-102023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2306.11974Full text available |
|
11 |
Material Type: Article
|
Provably Robust Cost-Sensitive Learning via Randomized SmoothingarXiv.org, 2023-102023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2310.08732Full text available |
|
12 |
Material Type: Article
|
Two-Dimensional Dynamic Fusion for Continuous AuthenticationarXiv.org, 2023-092023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2309.04128Full text available |
|
13 |
Material Type: Article
|
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion DetectionarXiv.org, 2023-082023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2308.11834Full text available |
|
14 |
Material Type: Article
|
Generated Graph DetectionarXiv.org, 2023-062023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2306.07758Full text available |
|
15 |
Material Type: Article
|
Struggle with Adversarial Defense? Try DiffusionarXiv.org, 2024-042024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08273Full text available |
|
16 |
Material Type: Article
|
Counteracting Concept Drift by Learning with Future Malware PredictionsarXiv.org, 2024-042024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.09352Full text available |
|
17 |
Material Type: Article
|
Adversarial Patterns: Building Robust Android Malware ClassifiersarXiv.org, 2024-042024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2203.02121Full text available |
|
18 |
Material Type: Article
|
Towards Building a Robust Toxicity PredictorarXiv.org, 2024-042024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08690Full text available |
|
19 |
Material Type: Article
|
MDENet: Multi-modal Dual-embedding Networks for Malware Open-set RecognitionarXiv.org, 2023-052023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2305.01245Full text available |
|
20 |
Material Type: Article
|
Mudjacking: Patching Backdoor Vulnerabilities in Foundation ModelsarXiv.org, 2024-022024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2402.14977Full text available |