KOINEU Logo
Exploring Adversarial Attack in Spiking Neural Networks with   Spike-Compatible Gradient

Exploring Adversarial Attack in Spiking Neural Networks with Spike-Compatible Gradient

๐Ÿ“ Original Info Title: Exploring Adversarial Attack in Spiking Neural Networks with Spike-Compatible Gradient ArXiv ID: 2001.01587 Date: 2020-10-02 Authors: Ling Liang, Xing Hu, Lei Deng, Yujie Wu, Guoqi Li, Yufei Ding, Peng Li, Yuan Xie ๐Ÿ“ Abstract โ€ฆ

Computer Science Cryptography and Security Electrical Engineering and Systems Science Neural Computing Machine Learning Network
Communication-Efficient Federated Deep Learning with Asynchronous Model   Update and Temporally Weighted Aggregation

Communication-Efficient Federated Deep Learning with Asynchronous Model Update and Temporally Weighted Aggregation

๐Ÿ“ Original Info Title: Communication-Efficient Federated Deep Learning with Asynchronous Model Update and Temporally Weighted Aggregation ArXiv ID: 1903.07424 Date: 2020-08-31 Authors: Yang Chen, Xiaoyan Sun, Yaochu Jin ๐Ÿ“ Abstract Federated learning โ€ฆ

Statistics Computer Science Model Artificial Intelligence Machine Learning Learning Distributed Computing
Spoof detection using time-delay shallow neural network and feature   switching

Spoof detection using time-delay shallow neural network and feature switching

๐Ÿ“ Original Info Title: Spoof detection using time-delay shallow neural network and feature switching ArXiv ID: 1904.07453 Date: 2020-07-28 Authors: Mari Ganesh Kumar, Suvidha Rupesh Kumar, Saranya M, B. Bharathi, Hema A. Murthy ๐Ÿ“ Abstract Detecting โ€ฆ

Audio Processing Detection Sound Computer Science Electrical Engineering and Systems Science Cryptography and Security Network Machine Learning
Behavioral and Game-Theoretic Security Investments in Interdependent   Systems Modeled by Attack Graphs

Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs

๐Ÿ“ Original Info Title: Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs ArXiv ID: 2001.03213 Date: 2020-05-12 Authors: Mustafa Abdallah, Parinaz Naghizadeh, Ashish R. Hota, Timothy Cason, Saurabh โ€ฆ

Systems and Control Game Theory Computer Science Model Electrical Engineering and Systems Science Quantitative Finance Economics System

< Category Statistics (Total: 1595) >

General
765
MATH-PH
1
Nonlinear Sciences
3
Quantitative Biology
5
Quantum Physics
6

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut