暂无分享,去创建一个
Benjamin Edwards | Biplav Srivastava | Heiko Ludwig | Ian Molloy | Nathalie Baracaldo | Bryant Chen | Taesung Lee | Wilka Carvalho | B. Srivastava | Ian Molloy | Nathalie Baracaldo | Bryant Chen | Heiko Ludwig | Wilka Carvalho | Taesung Lee | Ben Edwards | N. Baracaldo
[1] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[2] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[3] Yiran Chen,et al. Generative Poisoning Attack Method Against Neural Networks , 2017, ArXiv.
[4] Ankur Srivastava,et al. Neural Trojans , 2017, 2017 IEEE International Conference on Computer Design (ICCD).
[5] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[6] Charu C. Aggarwal,et al. On the Surprising Behavior of Distance Metrics in High Dimensional Spaces , 2001, ICDT.
[7] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[8] Blaine Nelson,et al. Misleading Learners: Co-opting Your Spam Filter , 2009 .
[9] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[10] Brendan Dolan-Gavitt,et al. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks , 2018, RAID.
[11] Percy Liang,et al. Certified Defenses for Data Poisoning Attacks , 2017, NIPS.
[12] Heiko Ludwig,et al. Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based Approach , 2017, AISec@CCS.
[13] Fabio Roli,et al. Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization , 2017, AISec@CCS.
[14] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[15] Robert Tibshirani,et al. Estimating the number of clusters in a data set via the gap statistic , 2000 .
[16] Pedro M. Domingos. A few useful things to know about machine learning , 2012, Commun. ACM.
[17] Samy Bengio,et al. Understanding deep learning requires rethinking generalization , 2016, ICLR.
[18] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[19] Benjamin Edwards,et al. Adversarial Robustness Toolbox v0.2.2 , 2018, ArXiv.
[20] Martin Wistuba,et al. Adversarial Robustness Toolbox v1.0.0 , 2018, 1807.01069.
[21] Blaine Nelson,et al. Behavior of Machine Learning Algorithms in Adversarial Environments , 2010 .
[22] Marius Kloft,et al. Online Anomaly Detection under Adversarial Impact , 2010, AISTATS.
[23] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[24] Marius Kloft,et al. Security analysis of online centroid anomaly detection , 2010, J. Mach. Learn. Res..