Picture for Alberto Redondo

Alberto Redondo

Protecting Classifiers From Attacks. A Bayesian Approach

Add code
Apr 18, 2020
Figure 1 for Protecting Classifiers From Attacks. A Bayesian Approach
Figure 2 for Protecting Classifiers From Attacks. A Bayesian Approach
Figure 3 for Protecting Classifiers From Attacks. A Bayesian Approach
Figure 4 for Protecting Classifiers From Attacks. A Bayesian Approach
Viaarxiv icon

Assessing Supply Chain Cyber Risks

Add code
Nov 26, 2019
Figure 1 for Assessing Supply Chain Cyber Risks
Figure 2 for Assessing Supply Chain Cyber Risks
Figure 3 for Assessing Supply Chain Cyber Risks
Viaarxiv icon

Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis

Add code
Nov 09, 2019
Figure 1 for Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Figure 2 for Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Figure 3 for Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Figure 4 for Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Viaarxiv icon

Adversarial classification: An adversarial risk analysis approach

Add code
Jun 26, 2018
Figure 1 for Adversarial classification: An adversarial risk analysis approach
Figure 2 for Adversarial classification: An adversarial risk analysis approach
Figure 3 for Adversarial classification: An adversarial risk analysis approach
Figure 4 for Adversarial classification: An adversarial risk analysis approach
Viaarxiv icon