Linked e-resources

Details

Chapter 1. IoT Attacks and Malware
Chapter 2. Machine Learning-based Online Source Identification for Image Forensics
Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles
Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning
Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems
Chapter 6. Secure Outsourced Machine Learning
Chapter 7. A Survey on Secure Outsourced Deep Learning.

Browse Subjects

Show more subjects...

Statistics

from
to
Export