Adversarial Attacks on Deep Models for Financial Transaction Records
暂无分享,去创建一个
Gleb Gusev | Evgeny Burnaev | Rodrigo Rivera-Castro | Ivan Fursov | Ivan Kireev | Matvey Morozov | Nina Kaploukhaya | Elizaveta Kovtun | Dmitry Babaev | Alexey Zaytsev | Gleb Gusev | Dmitrii Babaev | Matvey Morozov | A. Zaytsev | E. Burnaev | Ivan A Kireev | Elizaveta Kovtun | I. Fursov | Rodrigo Rivera-Castro | Nina Kaploukhaya
[1] Yanjun Qi,et al. Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[2] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[3] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[4] Philip S. Yu,et al. Adversarial Attack and Defense on Graph Data: A Survey , 2018 .
[5] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[6] Kilian Q. Weinberger,et al. BERTScore: Evaluating Text Generation with BERT , 2019, ICLR.
[7] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[8] Gleb Gusev,et al. Event sequence metric learning , 2020, ArXiv.
[9] Xipeng Qiu,et al. BERT-ATTACK: Adversarial Attack against BERT Using BERT , 2020, EMNLP.
[10] I. Fursov,et al. Differentiable Language Model Adversarial Attacks on Categorical Sequence Classifiers , 2020, ArXiv.
[11] Jan Hendrik Metzen,et al. On Detecting Adversarial Perturbations , 2017, ICLR.
[12] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[13] Alexander Tuzhilin,et al. E.T.-RNN: Applying Deep Learning to Credit Loan Applications , 2019, KDD.
[14] Dale Schuurmans,et al. Learning with a Strong Adversary , 2015, ArXiv.
[15] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[16] Xirong Li,et al. Deep Text Classification Can be Fooled , 2017, IJCAI.
[17] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.
[18] Valentin Khrulkov,et al. Art of Singular Vectors and Universal Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[19] Ryan R. Curtin,et al. Detecting Adversarial Samples from Artifacts , 2017, ArXiv.
[20] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[21] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[22] Quan Z. Sheng,et al. Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey , 2019 .
[23] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[24] Run Wang,et al. Towards a Robust Deep Neural Network in Texts: A Survey , 2019 .
[25] Peter A. Beling,et al. Adversarial learning in credit card fraud detection , 2017, 2017 Systems and Information Engineering Design Symposium (SIEDS).
[26] Nikolaos Pitropakis,et al. A taxonomy and survey of attacks against machine learning , 2019, Comput. Sci. Rev..
[27] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.