暂无分享,去创建一个
Roger Wattenhofer | Jens Hauser | Zhao Meng | Dami'an Pascual | Roger Wattenhofer | Zhao Meng | Damian Pascual | J. Hauser
[1] Roger Wattenhofer,et al. A Geometry-Inspired Attack for Generating Natural Language Adversarial Examples , 2020, COLING.
[2] Mike Schuster,et al. Japanese and Korean voice search , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[3] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[4] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[5] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[6] Sanja Fidler,et al. Aligning Books and Movies: Towards Story-Like Visual Explanations by Watching Movies and Reading Books , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[7] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[8] Nan Hua,et al. Universal Sentence Encoder for English , 2018, EMNLP.
[9] Aditi Raghunathan,et al. Certified Robustness to Adversarial Word Substitutions , 2019, EMNLP.
[10] John X. Morris,et al. TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP , 2020, EMNLP.
[11] Thomas Wolf,et al. HuggingFace's Transformers: State-of-the-art Natural Language Processing , 2019, ArXiv.
[12] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[13] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[14] Kun He,et al. Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks , 2020, AAAI.
[15] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[16] John X. Morris,et al. Reevaluating Adversarial Examples in Natural Language , 2020, FINDINGS.
[17] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[18] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[19] Po-Sen Huang,et al. Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation , 2019, EMNLP/IJCNLP.
[20] Mrinmaya Sachan,et al. Self-Supervised Contrastive Learning with Adversarial Perturbations for Robust Pretrained Language Models , 2021, ArXiv.
[21] Wanxiang Che,et al. Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency , 2019, ACL.
[22] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[23] David Vandyke,et al. Counter-fitting Word Vectors to Linguistic Constraints , 2016, NAACL.
[24] Hal Daumé,et al. Deep Unordered Composition Rivals Syntactic Methods for Text Classification , 2015, ACL.
[25] Siddhant Garg,et al. BAE: BERT-based Adversarial Examples for Text Classification , 2020, EMNLP.
[26] Felix Hill,et al. SimLex-999: Evaluating Semantic Models With (Genuine) Similarity Estimation , 2014, CL.
[27] Mani B. Srivastava,et al. Generating Natural Language Adversarial Examples , 2018, EMNLP.
[28] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[29] Lei Li,et al. Generating Fluent Adversarial Examples for Natural Languages , 2019, ACL.
[30] Sanja Fidler,et al. Skip-Thought Vectors , 2015, NIPS.
[31] N. Metropolis,et al. Equation of State Calculations by Fast Computing Machines , 1953, Resonance.
[32] Peter Szolovits,et al. Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment , 2020, AAAI.
[33] W. K. Hastings,et al. Monte Carlo Sampling Methods Using Markov Chains and Their Applications , 1970 .
[34] Xipeng Qiu,et al. BERT-ATTACK: Adversarial Attack against BERT Using BERT , 2020, EMNLP.