暂无分享,去创建一个
[1] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[2] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[3] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[4] Matthias Hein,et al. Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks , 2019, NeurIPS.
[5] Shuliang Wang,et al. Data Mining and Knowledge Discovery , 2005, Mathematical Principles of the Internet.
[6] Pierre Schaus,et al. Learning Optimal Decision Trees Using Caching Branch-and-Bound Search , 2020, AAAI.
[7] Yizheng Chen,et al. Cost-Aware Robust Tree Ensembles for Security Applications , 2019, USENIX Security Symposium.
[8] Aleksander Madry,et al. Adversarial Examples Are Not Bugs, They Are Features , 2019, NeurIPS.
[9] Aleksander Madry,et al. Robustness May Be at Odds with Accuracy , 2018, ICLR.
[10] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[11] Cho-Jui Hsieh,et al. Robust Decision Trees Against Adversarial Examples , 2019 .
[12] J. Doug Tygar,et al. Evasion and Hardening of Tree Ensemble Classifiers , 2015, ICML.
[13] Claudio Lucchese,et al. Treant: training evasion-aware decision trees , 2019, Data Mining and Knowledge Discovery.
[14] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[15] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[16] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[17] Michael Kearns,et al. Boosting Theory Towards Practice: Recent Developments in Decision Tree Induction and the Weak Learning Framework , 1996, AAAI/IAAI, Vol. 2.
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[20] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[21] Yingqian Zhang,et al. Learning Optimal Classification Trees Using a Binary Linear Program Formulation , 2019, BNAIC/BENELEARN.
[22] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[23] Yingqian Zhang,et al. Learning fuzzy decision trees using integer programming , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[24] IEEE Access , 2021, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[25] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[26] Dimitris Bertsimas,et al. Optimal classification trees , 2017, Machine Learning.
[27] Min Chen,et al. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities , 2017, IEEE Access.
[28] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.