暂无分享,去创建一个
[1] Daniel Kroening,et al. Concolic Testing for Deep Neural Networks , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[2] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[3] Mark Harman,et al. The Oracle Problem in Software Testing: A Survey , 2015, IEEE Transactions on Software Engineering.
[4] R. Baker Kearfott,et al. Introduction to Interval Analysis , 2009 .
[5] Andreas Zeller,et al. Fuzzing with Code Fragments , 2012, USENIX Security Symposium.
[6] Pascal Frossard,et al. Analysis of classifiers’ robustness to adversarial perturbations , 2015, Machine Learning.
[7] Abhik Roychoudhury,et al. Model-based whitebox fuzzing for program binaries , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[8] Yuriy Brun,et al. Fairness testing: testing software for discrimination , 2017, ESEC/SIGSOFT FSE.
[9] Alexander F. Gelbukh,et al. SOFTCARDINALITY-CORE: Improving Text Overlap with Distributional Measures for Semantic Textual Similarity , 2013, *SEMEVAL.
[10] Pushmeet Kohli,et al. A Dual Approach to Scalable Verification of Deep Networks , 2018, UAI.
[11] Julian Schütte,et al. WebEye - Automated Collection of Malicious HTTP Traffic , 2018, ArXiv.
[12] Kue Young,et al. A Tragic Loss , 2014, International journal of circumpolar health.
[13] Ting Wang,et al. TextBugger: Generating Adversarial Text Against Real-world Applications , 2018, NDSS.
[14] Junfeng Yang,et al. Formal Security Analysis of Neural Networks using Symbolic Intervals , 2018, USENIX Security Symposium.
[15] Andreas Zeller,et al. Mining input grammars from dynamic taints , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[16] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[17] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[18] Phil McMinn,et al. Search‐based software test data generation: a survey , 2004, Softw. Test. Verification Reliab..
[19] M. Levandowsky,et al. Distance between Sets , 1971, Nature.
[20] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[21] Matthew Wicker,et al. Feature-Guided Black-Box Safety Testing of Deep Neural Networks , 2017, TACAS.
[22] Alexander Gammerman,et al. Learning by Transduction , 1998, UAI.
[23] Danny Hendler,et al. Detecting Malicious PowerShell Commands using Deep Neural Networks , 2018, AsiaCCS.
[24] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[25] Adam Kiezun,et al. Grammar-based whitebox fuzzing , 2008, PLDI '08.
[26] Ian Goodfellow,et al. TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing , 2018, ICML.
[27] Jingyi Wang,et al. Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing , 2018, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[28] Sudipta Chattopadhyay,et al. Automated Directed Fairness Testing , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[29] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[30] Mykel J. Kochenderfer,et al. Toward Scalable Verification for Safety-Critical Deep Networks , 2018, ArXiv.