暂无分享,去创建一个
Matthew Wright | Yin Pan | Bo Yuan | Rayan Mosli | M. Wright | Yin Pan | Rayan Mosli | Bo Yuan
[1] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[3] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[4] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[5] R. Eberhart,et al. Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).
[6] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[7] Jon Barker,et al. Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.
[8] Carlos A. Coello Coello,et al. On the use of particle swarm optimization with multimodal functions , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[9] Zwe-Lee Gaing,et al. Particle swarm optimization to solving the economic dispatch considering the generator constraints , 2003 .
[10] Kamran Zamanifar,et al. A Novel Particle Swarm Optimization Approach for Grid Job Scheduling , 2009, ICISTM.
[11] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[12] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[13] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Lichao Cao,et al. Improved particle swarm optimization algorithm and its application in text feature selection , 2015, Appl. Soft Comput..
[15] Ying Zhang,et al. Towards End-to-End Speech Recognition with Deep Convolutional Neural Networks , 2016, INTERSPEECH.
[16] Martin Wattenberg,et al. Adversarial Spheres , 2018, ICLR.
[17] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Gustavo Carneiro,et al. of Deep Learning Methods in Mammography, Cardiovascular, and Microscopy Image Analysis , 2017 .
[19] Jun Zhang,et al. A Novel Set-Based Particle Swarm Optimization Method for Discrete Optimization Problems , 2010, IEEE Transactions on Evolutionary Computation.
[20] Maurice Clerc,et al. The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..
[21] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[22] Mani Srivastava,et al. GenAttack: practical black-box attacks with gradient-free optimization , 2018, GECCO.
[23] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[24] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[25] Daniel Jurafsky,et al. A Hierarchical Neural Autoencoder for Paragraphs and Documents , 2015, ACL.
[26] Geoffrey E. Hinton,et al. Dynamic Routing Between Capsules , 2017, NIPS.