暂无分享,去创建一个
[1] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[2] Beatrice Santorini,et al. Building a Large Annotated Corpus of English: The Penn Treebank , 1993, CL.
[3] Christoph Goller,et al. Learning task-dependent distributed representations by backpropagation through structure , 1996, Proceedings of International Conference on Neural Networks (ICNN'96).
[4] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[5] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[6] Dan Roth,et al. Learning Question Classifiers , 2002, COLING.
[7] Mark A. Przybocki,et al. The Automatic Content Extraction (ACE) Program – Tasks, Data, and Evaluation , 2004, LREC.
[8] Yiming Yang,et al. RCV1: A New Benchmark Collection for Text Categorization Research , 2004, J. Mach. Learn. Res..
[9] Dan Roth,et al. A Linear Programming Formulation for Global Inference in Natural Language Tasks , 2004, CoNLL.
[10] Bo Pang,et al. Seeing Stars: Exploiting Class Relationships for Sentiment Categorization with Respect to Rating Scales , 2005, ACL.
[11] Vangelis Metsis,et al. Spam Filtering with Naive Bayes - Which Naive Bayes? , 2006, CEAS.
[12] Min Zhang,et al. Automatic online news issue construction in web environment , 2008, WWW.
[13] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[14] Andrew McCallum,et al. Modeling Relations and Their Mentions without Labeled Text , 2010, ECML/PKDD.
[15] Kai Wang,et al. End-to-end scene text recognition , 2011, 2011 International Conference on Computer Vision.
[16] Helen Yannakoudakis,et al. A New Dataset and Method for Automatically Grading ESOL Texts , 2011, ACL.
[17] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[18] Mauro Cettolo,et al. WIT3: Web Inventory of Transcribed and Translated Talks , 2012, EAMT.
[19] Juliane Fluck,et al. Development of a benchmark corpus to support the automatic extraction of drug-related adverse effects from medical case reports , 2012, J. Biomed. Informatics.
[20] C. V. Jawahar,et al. Scene Text Recognition using Higher Order Language Priors , 2009, BMVC.
[21] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Jure Leskovec,et al. Hidden factors and hidden topics: understanding rating dimensions with review text , 2013, RecSys.
[23] Christopher Potts,et al. Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank , 2013, EMNLP.
[24] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[25] Mahmoud Al-Ayyoub,et al. Arabic sentiment analysis: Lexicon-based and corpus-based , 2013, 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).
[26] Jon Almazán,et al. ICDAR 2013 Robust Reading Competition , 2013, 2013 12th International Conference on Document Analysis and Recognition.
[27] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[28] M. Marelli,et al. SemEval-2014 Task 1: Evaluation of Compositional Distributional Semantic Models on Full Sentences through Semantic Relatedness and Textual Entailment , 2014, *SEMEVAL.
[29] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[30] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[31] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[32] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[33] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[34] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[35] Veronika Laippala,et al. Universal Dependencies 1.4 , 2015 .
[36] Christopher D. Manning,et al. Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.
[37] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[38] Joelle Pineau,et al. The Ubuntu Dialogue Corpus: A Large Dataset for Research in Unstructured Multi-Turn Dialogue Systems , 2015, SIGDIAL Conference.
[39] Margaret Mitchell,et al. VQA: Visual Question Answering , 2015, International Journal of Computer Vision.
[40] Tong Zhang,et al. Semi-supervised Convolutional Neural Networks for Text Categorization via Region Embedding , 2015, NIPS.
[41] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[42] Jens Lehmann,et al. DBpedia - A large-scale, multilingual knowledge base extracted from Wikipedia , 2015, Semantic Web.
[43] Shin Ishii,et al. Distributional Smoothing with Virtual Adversarial Training , 2015, ICLR 2016.
[44] Christopher Potts,et al. A large annotated corpus for learning natural language inference , 2015, EMNLP.
[45] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[46] Jianfeng Gao,et al. Deep Reinforcement Learning for Dialogue Generation , 2016, EMNLP.
[47] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[48] Joelle Pineau,et al. Building End-To-End Dialogue Systems Using Generative Hierarchical Neural Network Models , 2015, AAAI.
[49] Sanja Fidler,et al. MovieQA: Understanding Stories in Movies through Question-Answering , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[50] Phil Blunsom,et al. Reasoning about Entailment with Neural Attention , 2015, ICLR.
[51] Jakob Uszkoreit,et al. A Decomposable Attention Model for Natural Language Inference , 2016, EMNLP.
[52] José A. R. Fonollosa,et al. Character-based Neural Machine Translation , 2016, ACL.
[53] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[54] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[55] Patrick D. McDaniel,et al. Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.
[56] Michael S. Bernstein,et al. Visual Genome: Connecting Language and Vision Using Crowdsourced Dense Image Annotations , 2016, International Journal of Computer Vision.
[57] George Kurian,et al. Google's Neural Machine Translation System: Bridging the Gap between Human and Machine Translation , 2016, ArXiv.
[58] Michael S. Bernstein,et al. Visual7W: Grounded Question Answering in Images , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[59] Angli Liu,et al. Effective Crowd Annotation for Relation Extraction , 2016, NAACL.
[60] Ashutosh Vyas,et al. Deep Learning for Natural Language Processing , 2016 .
[61] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[62] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[63] David Bamman,et al. Adversarial Training for Relation Extraction , 2017, EMNLP.
[64] Andrew M. Dai,et al. Adversarial Training Methods for Semi-Supervised Text Classification , 2016, ICLR.
[65] Ali Farhadi,et al. Bidirectional Attention Flow for Machine Comprehension , 2016, ICLR.
[66] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[67] Zhen-Hua Ling,et al. Enhanced LSTM for Natural Language Inference , 2016, ACL.
[68] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[69] Alexander M. Rush,et al. OpenNMT: Open-Source Toolkit for Neural Machine Translation , 2017, ACL.
[70] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[71] Catherine Wong,et al. DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation , 2017, ArXiv.
[72] Lior Rokach,et al. Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers , 2017, ArXiv.
[73] Sameep Mehta,et al. Towards Crafting Text Adversarial Samples , 2017, ArXiv.
[74] Percy Liang,et al. Learning Symmetric Collaborative Dialogue Agents with Dynamic Knowledge Graph Embeddings , 2017, ACL.
[75] Shuohang Wang,et al. Machine Comprehension Using Match-LSTM and Answer Pointer , 2016, ICLR.
[76] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[77] Jungo Kasai,et al. Robust Multilingual Part-of-Speech Tagging via Adversarial Training , 2017, NAACL.
[78] Ryan P. Adams,et al. Motivating the Rules of the Game for Adversarial Example Research , 2018, ArXiv.
[79] Farinaz Koushanfar,et al. Adversarial Reprogramming of Sequence Classification Neural Networks , 2018, ArXiv.
[80] Fei Wang,et al. Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models , 2018, KDD.
[81] Thomas Demeester,et al. Adversarial training for multi-context joint entity and relation extraction , 2018, EMNLP.
[82] Hiroyuki Shindo,et al. Interpretable Adversarial Perturbation in Input Embedding Space for Text , 2018, IJCAI.
[83] Vitaly Shmatikov,et al. Fooling OCR Systems with Adversarial Text Images , 2018, ArXiv.
[84] Luke S. Zettlemoyer,et al. Adversarial Example Generation with Syntactically Controlled Paraphrase Networks , 2018, NAACL.
[85] Ngoc Thang Vu,et al. Comparing Attention-Based Convolutional and Recurrent Neural Networks: Success and Limitations in Machine Reading Comprehension , 2018, CoNLL.
[86] Trevor Darrell,et al. Fooling Vision and Language Models Despite Localization and Attention Mechanism , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[87] Sameer Singh,et al. Generating Natural Adversarial Examples , 2017, ICLR.
[88] Mohit Bansal,et al. Adversarial Over-Sensitivity and Over-Stability Strategies for Dialogue Models , 2018, CoNLL.
[89] Yuning Jiang,et al. Learning Visually-Grounded Semantics from Contrastive Adversarial Samples , 2018, COLING.
[90] Carlos Guestrin,et al. Semantically Equivalent Adversarial Rules for Debugging NLP models , 2018, ACL.
[91] Sameep Mehta,et al. Generating Adversarial Text Samples , 2018, ECIR.
[92] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[93] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.
[94] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.
[95] Samuel R. Bowman,et al. A Broad-Coverage Challenge Corpus for Sentence Understanding through Inference , 2017, NAACL.
[96] Yonatan Belinkov,et al. Synthetic and Natural Noise Both Break Neural Machine Translation , 2017, ICLR.
[97] Jinfeng Yi,et al. Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning , 2017, ACL.
[98] Mansour Ahmadi,et al. Microsoft Malware Classification Challenge , 2018, ArXiv.
[99] Abdullah Al-Dujaili,et al. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[100] Shi Feng,et al. Human-Computer Question Answering: The Case for Quizbowl , 2018 .
[101] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[102] Yang Liu,et al. Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer , 2018, ArXiv.
[103] Xirong Li,et al. Deep Text Classification Can be Fooled , 2017, IJCAI.
[104] Erik Cambria,et al. Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..
[105] Peter Clark,et al. SciTaiL: A Textual Entailment Dataset from Science Question Answering , 2018, AAAI.
[106] Ying Tan,et al. Black-Box Attacks against RNN based Malware Detection Algorithms , 2017, AAAI Workshops.
[107] Jordan Boyd-Graber,et al. Trick Me If You Can: Adversarial Writing of Trivia Challenge Questions , 2018, ACL.
[108] Dongyeop Kang,et al. AdvEntuRe: Adversarial Training for Textual Entailment with Knowledge-Guided Examples , 2018, ACL.
[109] Bo Li,et al. Adversarial Texts with Gradient Methods , 2018, ArXiv.
[110] Dejing Dou,et al. On Adversarial Examples for Character-Level Neural Machine Translation , 2018, COLING.
[111] Mohit Bansal,et al. Robust Machine Comprehension Models via Adversarial Training , 2018, NAACL.
[112] Yanjun Qi,et al. Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[113] Pasquale Minervini,et al. Adversarially Regularising Neural NLI Models to Integrate Logical Background Knowledge , 2018, CoNLL.
[114] Thomas Demeester,et al. An attentive neural architecture for joint segmentation and parsing and its application to real estate ads , 2017, Expert Syst. Appl..
[115] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[116] James R. Glass,et al. Detecting egregious responses in neural sequence-to-sequence models , 2018, ICLR.
[117] Xiaolin Li,et al. Adaptive Adversarial Attack on Scene Text Recognition , 2018, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[118] Michael I. Jordan,et al. Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data , 2018, J. Mach. Learn. Res..
[119] Jinfeng Yi,et al. Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples , 2018, AAAI.