Efficient Label Contamination Attacks Against Black-Box Learning Models
暂无分享,去创建一个
Bo An | Wei Gao | Teng Zhang | Mengchen Zhao | Bo An | Mengchen Zhao | Wei Gao | Teng Zhang
[1] E. Parzen. Annals of Mathematical Statistics , 1962 .
[2] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[3] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[4] Zoubin Ghahramani,et al. Proceedings of the 24th international conference on Machine learning , 2007, ICML 2007.
[5] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[6] AI Koan,et al. Weighted Sums of Random Kitchen Sinks: Replacing minimization with randomization in learning , 2008, NIPS.
[7] Xizhao Wang,et al. International journal of machine learning and cybernetics , 2010, Int. J. Mach. Learn. Cybern..
[8] Marius Kloft,et al. Online Anomaly Detection under Adversarial Impact , 2010, AISTATS.
[9] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[10] Claudia Eckert,et al. Adversarial Label Flips Attack on Support Vector Machines , 2012, ECAI.
[11] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[12] Lawrence O. Hall,et al. Label-noise reduction with support vector machines , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[13] Luc De Raedt,et al. Proceedings of the 20th European Conference on Artificial Intelligence , 2012 .
[14] Milind Tambe,et al. Stackelberg Security Games ( SSG ) Basics and Application Overview , 2018 .
[15] Claudia Eckert,et al. Is Feature Selection Secure against Training Data Poisoning? , 2015, ICML.
[16] Xiaojin Zhu,et al. The Security of Latent Dirichlet Allocation , 2015, AISTATS.
[17] Xiaojin Zhu,et al. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners , 2015, AAAI.
[18] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[19] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[20] Patrick P. K. Chan,et al. Data sanitization against adversarial label contamination based on data complexity , 2018, Int. J. Mach. Learn. Cybern..