Misleading Authorship Attribution of Source Code using Adversarial Learning
暂无分享,去创建一个
[1] Mani B. Srivastava,et al. Generating Natural Language Adversarial Examples , 2018, EMNLP.
[2] Stefanos Gritzalis,et al. Effective identification of source code authors using byte-level information , 2006, ICSE.
[3] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[5] Rachel Greenstadt,et al. Source Code Authorship Attribution Using Long Short-Term Memory Based Networks , 2017, ESORICS.
[6] Arvind Narayanan,et al. De-anonymizing Programmers via Code Stylometry , 2015, USENIX Security Symposium.
[7] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[8] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[9] Ting Wang,et al. TextBugger: Generating Adversarial Text Against Real-world Applications , 2018, NDSS.
[10] Matthew Wicker,et al. Feature-Guided Black-Box Safety Testing of Deep Neural Networks , 2017, TACAS.
[11] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[13] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[14] Stephen G. MacDonell,et al. Software Forensics for Discriminating between Program Authors using Case-Based Reasoning, Feed-Forward Neural Networks and Multiple , 1999 .
[15] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[16] Barton P. Miller,et al. Who Wrote This Code? Identifying the Authors of Program Binaries , 2011, ESORICS.
[17] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[18] Arvind Narayanan,et al. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries , 2015, NDSS.
[19] Andrew Turpin,et al. Application of Information Retrieval Techniques for Source Code Authorship Attribution , 2009, DASFAA.
[20] Lingyu Wang,et al. On Leveraging Coding Habits for Effective Binary Authorship Attribution , 2018, ESORICS.
[21] Barton P. Miller,et al. Identifying Multiple Authors in a Binary Program , 2017, ESORICS.
[22] Rachel Greenstadt,et al. Poster: Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).
[23] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[24] Eugene H. Spafford,et al. Authorship analysis: identifying the author of a program , 1997, Comput. Secur..
[25] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[26] Michael P. Wellman,et al. SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[27] Luke S. Zettlemoyer,et al. Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution , 2018, Proc. Priv. Enhancing Technol..
[28] Brian Pellin. Using Classification Techniques to Determine Source Code Authorship , 2006 .
[29] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools (2nd Edition) , 2006 .
[30] Aziz Mohaisen,et al. Large-Scale and Language-Oblivious Code Authorship Identification , 2018, CCS.
[31] Rachel Greenstadt,et al. Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments , 2017, ICSE.