They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization
暂无分享,去创建一个
[1] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[2] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[3] Zwe-Lee Gaing,et al. Particle swarm optimization to solving the economic dispatch considering the generator constraints , 2003 .
[4] Aleksander Madry,et al. Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors , 2018, ICLR.
[5] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[6] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[7] Gustavo Carneiro,et al. of Deep Learning Methods in Mammography, Cardiovascular, and Microscopy Image Analysis , 2017 .
[8] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[9] Dawn Xiaodong Song,et al. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms , 2018, ECCV.
[10] Mani Srivastava,et al. GenAttack: practical black-box attacks with gradient-free optimization , 2018, GECCO.
[11] Ying Zhang,et al. Towards End-to-End Speech Recognition with Deep Convolutional Neural Networks , 2016, INTERSPEECH.
[12] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[13] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[14] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[15] Kamran Zamanifar,et al. A Novel Particle Swarm Optimization Approach for Grid Job Scheduling , 2009, ICISTM.
[16] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.
[17] Jon Barker,et al. Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.
[18] Hyun Oh Song,et al. Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization , 2019, ICML.
[19] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[20] R. Eberhart,et al. Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).
[21] Lichao Cao,et al. Improved particle swarm optimization algorithm and its application in text feature selection , 2015, Appl. Soft Comput..
[22] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[23] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).