| 11188789 |
Detecting poisoning attacks on neural networks by activation clustering |
Bryant Chen, Wilka Carvalho, Heiko H. Ludwig, Ian M. Molloy, Jialong Zhang +1 more |
2021-11-30 |
| 11182562 |
Deep embedding for natural language content based on semantic dependencies |
Youngja Park |
2021-11-23 |
| 11171946 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords |
Suresh N. Chari, Ian M. Molloy, Youngja Park |
2021-11-09 |
| 11159547 |
Malware clustering approaches based on cognitive computing techniques |
Suresh N. Chari, Heqing Huang, Youngja Park |
2021-10-26 |
| 11132507 |
Cross-subject model-generated training data for relation extraction modeling |
Youngja Park, Arpita Roy |
2021-09-28 |
| 11132444 |
Using gradients to detect backdoors in neural networks |
Wilka Carvalho, Bryant Chen, Benjamin J. Edwards, Ian M. Molloy, Jialong Zhang |
2021-09-28 |
| 11023593 |
Protecting cognitive systems from model stealing attacks |
Ian M. Molloy, Dong Su |
2021-06-01 |
| 10908840 |
Semiconductor memory module including nonvolatile memory devices |
Junghwan Choi |
2021-02-02 |