Adversarial Examples for Generative Models
暂无分享,去创建一个
[1] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[2] Eduardo Valle,et al. Adversarial Images for Variational Autoencoders , 2016, ArXiv.
[3] Thomas Brox,et al. Learning to Generate Chairs, Tables and Cars with Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Dale Schuurmans,et al. Learning with a Strong Adversary , 2015, ArXiv.
[5] David Minnen,et al. Full Resolution Image Compression with Recurrent Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[8] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[9] Max Welling,et al. Semi-supervised Learning with Deep Generative Models , 2014, NIPS.
[10] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[11] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[12] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[13] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Alex Graves,et al. Conditional Image Generation with PixelCNN Decoders , 2016, NIPS.
[15] David J. Fleet,et al. Adversarial Manipulation of Deep Representations , 2015, ICLR.
[16] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[17] Ole Winther,et al. Autoencoding beyond pixels using a learned similarity metric , 2015, ICML.
[18] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[19] Joshua B. Tenenbaum,et al. Deep Convolutional Inverse Graphics Network , 2015, NIPS.
[20] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[21] Alex Graves,et al. Video Pixel Networks , 2016, ICML.
[22] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[23] Yoshua Bengio,et al. Generative Adversarial Networks , 2014, ArXiv.
[24] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[25] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[26] Heiga Zen,et al. WaveNet: A Generative Model for Raw Audio , 2016, SSW.
[27] David Minnen,et al. Variable Rate Image Compression with Recurrent Neural Networks , 2015, ICLR.
[28] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.