In this paper, we present the convergence analysis of momentum methods i...
A covert attack method often used by APT organizations is the DNS tunnel...
Momentum methods, including heavy-ball (HB) and Nesterov's accelerated
g...
Deep neural networks are vulnerable to adversarial examples, which can f...
We introduce a three stage pipeline: resized-diverse-inputs (RDIM),
dive...
Adversarial attacks are feasible in the real world for object detection....
Despite the empirical success of deep learning, it still lacks theoretic...
Averaging scheme has attracted extensive attention in deep learning as w...
In this work, we present a learning-based approach to analysis cyberspac...
Many previous methods generate adversarial examples based on the fast
gr...
Network anomaly detection is still a vibrant research area. As the fast
...