They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Mosli, Rayan (VerfasserIn)
Weitere Verfasser: Wright, Matthew (VerfasserIn), Yuan, Bo (VerfasserIn), Pan, Yin (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication 2020 Paul, Sebastian
Security Analysis Linear-Complexity Private Function Evaluation is Practical 2020 Holz, Marco
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization 2020 Mosli, Rayan
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys 2020 Janovsky, Adam
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation 2020 Küennemann, Robert
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols 2020 Cortier, Véronique
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing 2020 Boyen, Xavier
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key 2020 Liu, Wenling
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Linear Attack on Round-Reduced DES Using Deep Learning 2020 Hou, Botao
Detection by Attack: Detecting Adversarial Samples by Undercover Attack 2020 Zhou, Qifei
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA 2020 Aparicio-Sánchez, Damián
On the Privacy Risks of Compromised Trigger-Action Platforms 2020 Chiang, Yu-Hsi
Certifying Decision Trees Against Evasion Attacks by Program Analysis 2020 Calzavara, Stefano
Understanding Object Detection Through an Adversarial Lens 2020 Chow, Ka-Ho
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE 2020 Costache, Anamaria
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain 2020 Sun, Hanyi
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC 2020 Dalskov, Anders
Alle Artikel auflisten