暂无分享,去创建一个
Yiran Chen | Qing Wu | Hai Li | Chaofei Yang | Yiran Chen | Hai Helen Li | Qing Wu | Chaofei Yang | Qing Wu
[1] Eugenio Culurciello,et al. An Analysis of Deep Neural Network Models for Practical Applications , 2016, ArXiv.
[2] Alexander Gruenstein,et al. Accurate and compact large vocabulary speech recognition on mobile devices , 2013, INTERSPEECH.
[3] Marius Kloft,et al. Online Anomaly Detection under Adversarial Impact , 2010, AISTATS.
[4] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[5] Claudia Eckert,et al. Adversarial Label Flips Attack on Support Vector Machines , 2012, ECAI.
[6] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[7] Zheng Zhang,et al. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.
[8] Susmita Sur-Kolay,et al. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.
[9] Yiran Chen,et al. Security of neuromorphic computing: Thwarting learning attacks using memristor's obsolescence effect , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[10] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[11] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[14] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[15] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[16] Stefan Daniel Dumitrescu,et al. Robust deep-learning models for text-to-speech synthesis support on embedded devices , 2015, MEDES.
[17] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.