Carlini

Results: 40



#Item
1Artificial neural networks / Applied mathematics / Cybernetics / Mathematics / Deep learning / CIFAR-10 / MNIST database / Rectifier / Softmax function / Feedforward neural network / Gradient descent / Activation function

Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:30
2

Hidden Voice Commands Nicholas Carlini and Pratyush Mishra, University of California, Berkeley; Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields, Georgetown University; David Wagner, University of California,

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-08-10 17:31:34
    3

    Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

    Add to Reading List

    Source URL: nebelwelt.net

    Language: English - Date: 2018-08-13 04:44:10
      4

      Prof. E. A. Carlini Discurso da Cerimônia de entrega do título de Professor Emérito, UNIFESP . O

      Add to Reading List

      Source URL: www.cebrid.com.br

      - Date: 2015-06-09 15:56:50
        5

        Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

        Add to Reading List

        Source URL: security.cs.georgetown.edu

        - Date: 2016-07-13 03:02:48
          6Oceans / Southern Ocean / ARA Comodoro Rivadavia / Comodoro Rivadavia / Carlini Base / Science and technology in Argentina / Geography of Argentina / Economy of Argentina

          National capability of Argentina to observe the Southern Ocean Dr T. A. Remenyi Southern Ocean Observing System Introduction At present, it is extremly difficult for any individual to determine the general capacity of ot

          Add to Reading List

          Source URL: www.soos.aq

          Language: English
          7Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

          Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2016-06-29 23:07:54
          8Academic publishing / Evaluation / Review / Manuscript

          Reviewer’s report Title: Are recent attempts to quit smoking associated with reduced drinking in England? A cross-sectional population survey Version: 0 Date: 21 Apr 2016 Reviewer: Beatriz Carlini Reviewer’s report:

          Add to Reading List

          Source URL: static-content.springer.com

          Language: English
          9Computing / Software engineering / Computer programming / C standard library / Software bugs / Computer security / Memory management / Subroutines / Control-flow integrity / Call stack / Stack buffer overflow / Setjmp.h

          Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

          Add to Reading List

          Source URL: hexhive.github.io

          Language: English - Date: 2016-06-13 11:08:40
          10

          Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

          Add to Reading List

          Source URL: www.nebelwelt.net

          Language: English - Date: 2016-04-13 09:07:45
            UPDATE