Practical Black-Box Attacks against Machine Learning
暂无分享,去创建一个
Ananthram Swami | Somesh Jha | Patrick D. McDaniel | Z. Berkay Celik | Nicolas Papernot | Ian J. Goodfellow | Nicolas Papernot | A. Swami | P. Mcdaniel | S. Jha | Z. B. Celik | I. Goodfellow
[1] References , 1971 .
[2] Kunihiko Fukushima,et al. Neocognitron: A new algorithm for pattern recognition tolerant of deformations and shifts in position , 1982, Pattern Recognit..
[3] Jeffrey Scott Vitter,et al. Random sampling with a reservoir , 1985, TOMS.
[4] PAUL J. WERBOS,et al. Generalization of backpropagation with application to a recurrent gas market model , 1988, Neural Networks.
[5] Carsten Peterson,et al. A New Method for Mapping Optimization Problems Onto Neural Networks , 1989, Int. J. Neural Syst..
[6] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[7] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[8] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[9] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[10] Marc'Aurelio Ranzato,et al. Unsupervised Learning of Invariant Feature Hierarchies with Applications to Object Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[12] Geoffrey E. Hinton,et al. Deep Boltzmann Machines , 2009, AISTATS.
[13] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[14] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[15] Blaine Nelson,et al. Support Vector Machines Under Adversarial Label Noise , 2011, ACML.
[16] Tara N. Sainath,et al. FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .
[17] Razvan Pascanu,et al. Theano: new features and speed improvements , 2012, ArXiv.
[18] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[19] Johannes Stallkamp,et al. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition , 2012, Neural Networks.
[20] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[21] Alex Graves,et al. Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.
[22] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[23] Rich Caruana,et al. Do Deep Nets Really Need to be Deep? , 2013, NIPS.
[24] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[25] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[26] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[27] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[28] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[29] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[30] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[31] B. Frey,et al. Predicting the sequence specificities of DNA- and RNA-binding proteins by deep learning , 2015, Nature Biotechnology.
[32] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[33] John Salvatier,et al. Theano: A Python framework for fast computation of mathematical expressions , 2016, ArXiv.
[34] J. Doug Tygar,et al. Evasion and Hardening of Tree Ensemble Classifiers , 2015, ICML.
[35] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[36] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[37] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[38] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[39] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.