• TrojDRL

  • Referenced in 1 article [sw41287]
  • identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan ... work, we show that these training-time vulnerabilities extend to deep reinforcement learning (DRL) agents ... show that existing Trojan defense mechanisms for classification tasks are not effective in the reinforcement...
  • BadNets

  • Referenced in 3 articles [sw41281]
  • BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. Deep learning-based techniques have ... wide variety of recognition and classification tasks. However, these networks are typically computationally expensive...
  • meminf-defense

  • Referenced in 1 article [sw41512]
  • classification networks by exploiting their generative power. Research showed that deep learning models are vulnerable...
  • Advbox

  • Referenced in 1 article [sw41290]
  • deployed for computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve ... studies have shown that they are all vulnerable to the attack of adversarial examples. Small...
  • Devign

  • Referenced in 1 article [sw40145]
  • work on manually-defined patterns of vulnerabilities from various code representation graphs and the recent ... neural network based model for graph-level classification through learning on a rich...
  • SmartCheck

  • Referenced in 0 articles [sw37692]
  • pace of development in this field. Automated vulnerability detection tools, which help detect potentially problematic ... this area. We provide a comprehensive classification of code issues in Solidity and implement SmartCheck ... current state of knowledge on Solidity vulnerabilities and shows significant improvements over alternatives. SmartCheck...
  • MALOnt

  • Referenced in 1 article [sw41851]
  • their tactics, Indicators of Compromise(IoC), and vulnerabilities in different platforms from scattered threat sources ... knowledge graph enables the analysis, detection, classification, and attribution of cyber threats caused by malware...
  • FLGUARD

  • Referenced in 1 article [sw41617]
  • aggregated model. Moreover, FL is also vulnerable to inference attacks, in which a malicious aggregator ... several datasets and applications (including image classification, word prediction, and IoT intrusion detection), demonstrating that...
  • SINE

  • Referenced in 1 article [sw32344]
  • networks are complete. Thus, their performance is vulnerable to missing data and suffers from poor ... baselines in various tasks, including node classification, node clustering, and link prediction, under settings with...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • PRISM

  • Referenced in 442 articles [sw01186]
  • PRISM: Probabilistic symbolic model checker. In this paper...
  • ELECTRE

  • Referenced in 129 articles [sw02971]
  • Electre Methods. Over the last three decades a...
  • Pajek

  • Referenced in 154 articles [sw03707]
  • Pajek -- analysis and visualization of large networks. Pajek...
  • CPLEX

  • Referenced in 2773 articles [sw04082]
  • IBM® ILOG® CPLEX® offers C, C++, Java, .NET...
  • Gurobi

  • Referenced in 690 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...
  • Valgrind

  • Referenced in 62 articles [sw04420]
  • Valgrind is an instrumentation framework for building dynamic...
  • XPRESS

  • Referenced in 230 articles [sw04834]
  • FICO Xpress is the premier mathematical modeling and...
  • GAMS

  • Referenced in 866 articles [sw04978]
  • The General Algebraic Modeling System (GAMS) is specifically...