![]() ![]() Vienna University of Technology (TU Wien), Austria Politecnico di Torino (PoliTo), Italy New York University Abu Dhabi, United Arab Emirates Sahay and Mohit SewakīITS Pilani, India Security & Compliance Research, Microsoft, IndiaĭVS-Attacks: Adversarial Attacks on Dynamic Vision Sensors for Spiking Neural Networks Īlberto Marchisio, Giacomo Pira, Maurizio Martina, Guido Masera and Muhammad Shafique Identification of Adversarial Android Intents using Reinforcement Learning The University of Auckland, New Zealand Southwest Jiaotong University, China Macquarie University, New Zealand Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Yi Chen and Xuyun Zhang University of Maryland, Baltimore County, United States University of North Carolina Wilmington, United StatesĮAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi and Tim Finin ![]() Generating Fake Cyber Threat Intelligence Using Transformer-Based Models Guangzhou University, China Zhejiang University of Science and Technology, China Word-Level Textual Adversarial Attack in the Embedding Space īin Zhu, Zhaoquan Gu, Yushun Xie, Danni Wu, Yaguan Qian and Le Wang Sunday, July 18, 8:15AM-10:15AM, Room: IJCNN Virtual Room 1, Chair: Pecori, Riccardo Session S1: Artificial Intelligence and Security (AISE) Sunday, July 18, 8:00AM-8:15AM, Room: IJCNN Virtual Room 1, Chair: Zeng-Guang Hou, Xin Yao, Tianzi Jiang ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |