skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 617  for All Library Resources

Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Semi-supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection
Material Type:
Article
Add to My Research

Semi-supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection

arXiv.org, 2023-09

2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2309.06643

Full text available

2
An Extensive Study of Residential Proxies in China
Material Type:
Article
Add to My Research

An Extensive Study of Residential Proxies in China

arXiv.org, 2022-09

2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-nd/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2209.06056

Full text available

3
FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models
Material Type:
Article
Add to My Research

FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models

arXiv.org, 2024-04

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08631

Full text available

4
Towards Robust Domain Generation Algorithm Classification
Material Type:
Article
Add to My Research

Towards Robust Domain Generation Algorithm Classification

arXiv.org, 2024-04

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.06236

Full text available

5
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation
Material Type:
Article
Add to My Research

Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation

arXiv.org, 2024-03

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2403.07673

Full text available

6
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability
Material Type:
Article
Add to My Research

Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

arXiv.org, 2022-06

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2009.13243

Full text available

7
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts
Material Type:
Article
Add to My Research

LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts

arXiv.org, 2024-02

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2401.07261

Full text available

8
A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers
Material Type:
Article
Add to My Research

A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers

arXiv.org, 2022-05

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2105.13530

Full text available

9
User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity Measurement
Material Type:
Article
Add to My Research

User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity Measurement

arXiv.org, 2023-12

2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2312.10273

Full text available

10
Universal adversarial perturbations for multiple classification tasks with quantum classifiers
Material Type:
Article
Add to My Research

Universal adversarial perturbations for multiple classification tasks with quantum classifiers

arXiv.org, 2023-10

2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2306.11974

Full text available

11
Provably Robust Cost-Sensitive Learning via Randomized Smoothing
Material Type:
Article
Add to My Research

Provably Robust Cost-Sensitive Learning via Randomized Smoothing

arXiv.org, 2023-10

2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2310.08732

Full text available

12
Two-Dimensional Dynamic Fusion for Continuous Authentication
Material Type:
Article
Add to My Research

Two-Dimensional Dynamic Fusion for Continuous Authentication

arXiv.org, 2023-09

2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2309.04128

Full text available

13
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection
Material Type:
Article
Add to My Research

Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection

arXiv.org, 2023-08

2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2308.11834

Full text available

14
Generated Graph Detection
Material Type:
Article
Add to My Research

Generated Graph Detection

arXiv.org, 2023-06

2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2306.07758

Full text available

15
Struggle with Adversarial Defense? Try Diffusion
Material Type:
Article
Add to My Research

Struggle with Adversarial Defense? Try Diffusion

arXiv.org, 2024-04

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08273

Full text available

16
Counteracting Concept Drift by Learning with Future Malware Predictions
Material Type:
Article
Add to My Research

Counteracting Concept Drift by Learning with Future Malware Predictions

arXiv.org, 2024-04

2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.09352

Full text available

17
Adversarial Patterns: Building Robust Android Malware Classifiers
Material Type:
Article
Add to My Research

Adversarial Patterns: Building Robust Android Malware Classifiers

arXiv.org, 2024-04

2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2203.02121

Full text available

18
Towards Building a Robust Toxicity Predictor
Material Type:
Article
Add to My Research

Towards Building a Robust Toxicity Predictor

arXiv.org, 2024-04

2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2404.08690

Full text available

19
MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition
Material Type:
Article
Add to My Research

MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition

arXiv.org, 2023-05

2023. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2305.01245

Full text available

20
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models
Material Type:
Article
Add to My Research

Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models

arXiv.org, 2024-02

2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2402.14977

Full text available

Results 1 - 20 of 617  for All Library Resources

Results 1 2 3 4 5 next page

Searching Remote Databases, Please Wait