暂无分享,去创建一个
[1] Héctor Pomares,et al. Window Size Impact in Human Activity Recognition , 2014, Sensors.
[2] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[3] S. Chitrakala,et al. A survey on human activity recognition from videos , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[4] Hassan Ghasemzadeh,et al. Adar: Adversarial Activity Recognition in Wearables , 2019, 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[5] Gwenn Englebienne,et al. Accurate activity recognition in a home setting , 2008, UbiComp.
[6] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[7] Davide Anguita,et al. A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.
[8] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Qiang Yang,et al. Cross-domain activity recognition , 2009, UbiComp.
[10] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[11] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[13] Ignacio Rojas,et al. Design, implementation and validation of a novel open framework for agile development of mobile health applications , 2015, BioMedical Engineering OnLine.
[14] Sozo Inoue,et al. Activity Recognition: Translation across Sensor Modalities Using Deep Learning , 2018, UbiComp/ISWC Adjunct.
[15] A. Azzouz. 2011 , 2020, City.
[16] Daniel P. Siewiorek,et al. Activity recognition and monitoring using multiple sensors on different body positions , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[17] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[18] Ian J. Goodfellow,et al. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library , 2016 .
[19] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[20] Fahad Shahbaz Khan,et al. Cross-Domain Transferability of Adversarial Perturbations , 2019, NeurIPS.
[21] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[22] Miguel A. Labrador,et al. A Survey on Human Activity Recognition using Wearable Sensors , 2013, IEEE Communications Surveys & Tutorials.
[23] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[24] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.