Mitigating Adversarial Attacks on Medical Image Understanding Systems
暂无分享,去创建一个
Dmitry Goldgof | Rahul Paul | Robert Gillies | Lawrence Hall | Matthew Schabath | R. Gillies | L. Hall | D. Goldgof | M. Schabath | Rahul Paul | Dmitry Goldgof
[1] C. Gatsonis,et al. Reduced Lung-Cancer Mortality with Low-Dose Computed Tomographic Screening , 2012 .
[2] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[3] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[4] Matthew B Schabath,et al. Differences in Patient Outcomes of Prevalence, Interval, and Screen-Detected Lung Cancers in the CT Arm of the National Lung Screening Trial , 2016, PloS one.
[5] Yuval Elovici,et al. CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning , 2019, USENIX Security Symposium.
[6] Andrew L. Beam,et al. Adversarial Attacks Against Medical Deep Learning Systems , 2018, ArXiv.
[7] Samuel H. Hawkins,et al. Predicting malignant nodules by fusing deep features with classical radiomics features , 2018, Journal of medical imaging.
[8] Benjamin Edwards,et al. Adversarial Robustness Toolbox v0.2.2 , 2018, ArXiv.
[9] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[10] Samuel H. Hawkins,et al. Predicting Malignant Nodules from Screening CT Scans , 2016, Journal of thoracic oncology : official publication of the International Association for the Study of Lung Cancer.
[11] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[12] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[13] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[14] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[15] K. Hajian‐Tilaki,et al. Receiver Operating Characteristic (ROC) Curve Analysis for Medical Diagnostic Test Evaluation. , 2013, Caspian journal of internal medicine.
[16] Qihe Liu,et al. Review of Artificial Intelligence Adversarial Attack and Defense Technologies , 2019, Applied Sciences.
[17] A. Ng. Feature selection, L1 vs. L2 regularization, and rotational invariance , 2004, Twenty-first international conference on Machine learning - ICML '04.
[18] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[19] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[20] François Chollet,et al. Keras: The Python Deep Learning library , 2018 .
[21] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.