Attackability Characterization of Adversarial Evasion Attack on Discrete Data
暂无分享,去创建一个
Fenglong Ma | Xiangliang Zhang | Yun Shen | Yutong Wang | Jin Li | Yufei Han | Hongyan Bao | Xiangliang Zhang | Yufei Han | Yun Shen | Jin Li | Fenglong Ma | Hongyan Bao | Yutong Wang
[1] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[2] Patrick P. K. Chan,et al. Adversarial Feature Selection Against Evasion Attacks , 2016, IEEE Transactions on Cybernetics.
[3] Amin Karbasi,et al. Weakly Submodular Maximization Beyond Cardinality Constraints: Does Randomization Help Greedy? , 2017, ICML.
[4] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[5] Stefano Ermon,et al. Adversarial Examples for Natural Language Classification Problems , 2018 .
[6] Y. C. Pati,et al. Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.
[7] Wenruo Bai,et al. Deep Submodular Functions , 2017, ArXiv.
[8] Sameep Mehta,et al. Towards Crafting Text Adversarial Samples , 2017, ArXiv.
[9] Alexandros G. Dimakis,et al. Discrete Attacks and Submodular Optimization with Applications to Text Classification , 2018, ArXiv.
[10] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[11] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[12] Ben Y. Zhao,et al. Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.
[13] Alexandros G. Dimakis,et al. Restricted Strong Convexity Implies Weak Submodularity , 2016, The Annals of Statistics.
[14] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[15] Laurence A. Wolsey,et al. Best Algorithms for Approximating the Maximum of a Submodular Set Function , 1978, Math. Oper. Res..
[16] Abhimanyu Das,et al. Submodular meets Spectral: Greedy Algorithms for Subset Selection, Sparse Approximation and Dictionary Selection , 2011, ICML.
[17] Xiangliang Zhang,et al. Efficient Active Learning of Halfspaces via Query Synthesis , 2015, AAAI.
[18] Yanjun Qi,et al. Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[19] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[20] Avinatan Hassidim,et al. Robust Guarantees of Stochastic Greedy Algorithms , 2017, ICML.
[21] J. Schnoor,et al. Photosynthetic Control of Atmospheric Carbonyl Sulfide During the Growing Season , 2008, Science.
[22] Andrew M. Dai,et al. Adversarial Training Methods for Semi-Supervised Text Classification , 2016, ICLR.
[23] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[24] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[25] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[26] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[27] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.
[28] Stephan Günnemann,et al. Adversarial Attacks on Node Embeddings via Graph Poisoning , 2018, ICML.
[29] Xiangliang Zhang,et al. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering , 2014, CIKM.
[30] Michael I. Jordan,et al. Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data , 2018, J. Mach. Learn. Res..
[31] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[32] Fenglong Ma,et al. Risk Prediction on Electronic Health Records with Prior Medical Knowledge , 2018, KDD.
[33] Bo Li,et al. Adversarial Texts with Gradient Methods , 2018, ArXiv.