Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics
暂无分享,去创建一个
Ross Maciejewski | Jundong Li | Yuxin Ma | Tiankai Xie | Jundong Li | R. Maciejewski | Yuxin Ma | Tiankai Xie | Ross Maciejewski
[1] Fabio Roli,et al. Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective , 2015, IEEE Signal Processing Magazine.
[2] Marc Streit,et al. Opening the Black Box: Strategies for Increased User Involvement in Existing Algorithm Implementations , 2014, IEEE Transactions on Visualization and Computer Graphics.
[3] Kenney Ng,et al. Interacting with Predictions: Visual Inspection of Black-box Machine Learning Models , 2016, CHI.
[4] Alexander M. Rush,et al. Seq2seq-Vis: A Visual Debugging Tool for Sequence-to-Sequence Models , 2018, IEEE Transactions on Visualization and Computer Graphics.
[5] David Gotz,et al. Progressive Visual Analytics: User-Driven Visual Exploration of In-Progress Analytics , 2014, IEEE Transactions on Visualization and Computer Graphics.
[6] Dik Lun Lee,et al. iForest: Interpreting Random Forests via Visual Analytics , 2019, IEEE Transactions on Visualization and Computer Graphics.
[7] Jun Zhu,et al. Analyzing the Noise Robustness of Deep Neural Networks , 2018, 2018 IEEE Conference on Visual Analytics Science and Technology (VAST).
[8] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[9] Enrico Blanzieri,et al. A survey of learning-based techniques of email spam filtering , 2008, Artificial Intelligence Review.
[10] Brent Lagesse,et al. Analysis of Causative Attacks against SVMs Learning from Data Streams , 2017, IWSPA@CODASPY.
[11] Alberto Botana López,et al. Deep Learning in Biometrics: A Survey , 2019, ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal.
[12] Jun Zhu,et al. Analyzing the Training Processes of Deep Generative Models , 2018, IEEE Transactions on Visualization and Computer Graphics.
[13] Dawn Xiaodong Song,et al. Decision Boundary Analysis of Adversarial Examples , 2018, ICLR.
[14] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[15] Chang Liu,et al. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[16] Ross Maciejewski,et al. The State‐of‐the‐Art in Predictive Visual Analytics , 2017, Comput. Graph. Forum.
[17] Yindalon Aphinyanagphongs,et al. A Workflow for Visual Diagnostics of Binary Classifiers using Instance-Level Explanations , 2017, 2017 IEEE Conference on Visual Analytics Science and Technology (VAST).
[18] Heidrun Schumann,et al. A Review and Characterization of Progressive Visual Analytics , 2018, Informatics.
[19] Sebastian Thrun,et al. Dermatologist-level classification of skin cancer with deep neural networks , 2017, Nature.
[20] Zhen Li,et al. Understanding Hidden Memories of Recurrent Neural Networks , 2017, 2017 IEEE Conference on Visual Analytics Science and Technology (VAST).
[21] Karsten Klein,et al. Graph Thumbnails: Identifying and Comparing Multiple Graphs at a Glance , 2018, IEEE Transactions on Visualization and Computer Graphics.
[22] Alex Endert,et al. The State of the Art in Integrating Machine Learning into Visual Analytics , 2017, Comput. Graph. Forum.
[23] Ben Shneiderman,et al. ManyNets: an interface for multiple network analysis and visualization , 2010, CHI.
[24] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[25] Jeffrey Heer,et al. GraphPrism: compact visualization of network structure , 2012, AVI.
[26] David Maxwell Chickering,et al. ModelTracker: Redesigning Performance Analysis Tools for Machine Learning , 2015, CHI.
[27] Xiting Wang,et al. Towards better analysis of machine learning models: A visual analytics perspective , 2017, Vis. Informatics.
[28] Nasseh Tabrizi,et al. Adversarial Machine Learning: A Literature Review , 2018, MLDM.
[29] Hao Yang,et al. DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks , 2019, IEEE Transactions on Visualization and Computer Graphics.
[30] Claudia Eckert,et al. Adversarial Label Flips Attack on Support Vector Machines , 2012, ECAI.
[31] Michael Gleicher,et al. Splatterplots: Overcoming Overdraw in Scatter Plots , 2013, IEEE Transactions on Visualization and Computer Graphics.
[32] Martin Wattenberg,et al. GAN Lab: Understanding Complex Deep Generative Models using Interactive Visual Experimentation , 2018, IEEE Transactions on Visualization and Computer Graphics.
[33] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.
[34] Denis Lalanne,et al. Surveying the complementary role of automatic data analysis and visualization in knowledge discovery , 2009, VAKD '09.
[35] Alexander M. Rush,et al. LSTMVis: A Tool for Visual Analysis of Hidden State Dynamics in Recurrent Neural Networks , 2016, IEEE Transactions on Visualization and Computer Graphics.
[36] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[37] Silvia Miksch,et al. Visual Methods for Analyzing Probabilistic Classification Data , 2014, IEEE Transactions on Visualization and Computer Graphics.
[38] Bongshin Lee,et al. Squares: Supporting Interactive Performance Analysis for Multiclass Classifiers , 2017, IEEE Transactions on Visualization and Computer Graphics.
[39] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[40] Hao Yang,et al. GANViz: A Visual Analytics Approach to Understand the Adversarial Game , 2018, IEEE Transactions on Visualization and Computer Graphics.
[41] Jing Wu,et al. Visual Diagnosis of Tree Boosting Methods , 2018, IEEE Transactions on Visualization and Computer Graphics.
[42] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[43] Tudor Dumitras,et al. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[44] Huamin Qu,et al. RuleMatrix: Visualizing and Understanding Classifiers with Rules , 2018, IEEE Transactions on Visualization and Computer Graphics.
[45] Desney S. Tan,et al. EnsembleMatrix: interactive visualization to support machine learning with multiple classifiers , 2009, CHI.
[46] Ben Shneiderman,et al. The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.
[47] Hod Lipson,et al. Understanding Neural Networks Through Deep Visualization , 2015, ArXiv.
[48] Jarke J. van Wijk,et al. BaobabView: Interactive construction and analysis of decision trees , 2011, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST).
[49] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[50] Duen Horng Chau,et al. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector , 2018, ECML/PKDD.
[51] Fan Zhang,et al. Recent progress and trends in predictive visual analytics , 2017, Frontiers of Computer Science.
[52] Kun Zhou,et al. Visual Abstraction and Exploration of Multi-class Scatterplots , 2014, IEEE Transactions on Visualization and Computer Graphics.
[53] Susmita Sur-Kolay,et al. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.
[54] Maozhen Li,et al. A survey of emerging approaches to spam filtering , 2012, CSUR.
[55] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[56] Minsuk Kahng,et al. ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models , 2017, IEEE Transactions on Visualization and Computer Graphics.
[57] Li Chen,et al. Cluster-Based Visual Abstraction for Multivariate Scatterplots , 2018, IEEE Transactions on Visualization and Computer Graphics.
[58] Percy Liang,et al. Certified Defenses for Data Poisoning Attacks , 2017, NIPS.
[59] Jimeng Sun,et al. RetainVis: Visual Analytics with Interpretable and Interactive Recurrent Neural Networks on Electronic Medical Records , 2018, IEEE Transactions on Visualization and Computer Graphics.
[60] Bo Gao,et al. Driving Style Recognition for Intelligent Vehicle Control and Advanced Driver Assistance: A Survey , 2018, IEEE Transactions on Intelligent Transportation Systems.
[61] Xiaojin Zhu,et al. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners , 2015, AAAI.
[62] Enrico Bertini,et al. INFUSE: Interactive Feature Selection for Predictive Modeling of High Dimensional Data , 2014, IEEE Transactions on Visualization and Computer Graphics.
[63] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[64] Martin Wattenberg,et al. Visualizing Dataflow Graphs of Deep Learning Models in TensorFlow , 2018, IEEE Transactions on Visualization and Computer Graphics.
[65] Paulo E. Rauber,et al. Visualizing the Hidden Activity of Artificial Neural Networks , 2017, IEEE Transactions on Visualization and Computer Graphics.
[66] Tudor Dumitras,et al. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.
[67] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[68] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .