暂无分享,去创建一个
Ananthram Swami | Somesh Jha | Patrick D. McDaniel | Z. Berkay Celik | Nicolas Papernot | Ian J. Goodfellow | Nicolas Papernot | A. Swami | P. Mcdaniel | S. Jha | Z. B. Celik | I. Goodfellow
[1] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[2] Kunihiko Fukushima,et al. Neocognitron: A new algorithm for pattern recognition tolerant of deformations and shifts in position , 1982, Pattern Recognit..
[3] Jeffrey Scott Vitter,et al. Random sampling with a reservoir , 1985, TOMS.
[4] PAUL J. WERBOS,et al. Generalization of backpropagation with application to a recurrent gas market model , 1988, Neural Networks.
[5] Carsten Peterson,et al. A New Method for Mapping Optimization Problems Onto Neural Networks , 1989, Int. J. Neural Syst..
[6] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[7] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[8] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[9] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[10] Marc'Aurelio Ranzato,et al. Unsupervised Learning of Invariant Feature Hierarchies with Applications to Object Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[12] Geoffrey E. Hinton,et al. Deep Boltzmann Machines , 2009, AISTATS.
[13] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[14] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[15] Blaine Nelson,et al. Support Vector Machines Under Adversarial Label Noise , 2011, ACML.
[16] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[17] Tara N. Sainath,et al. FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .
[18] Razvan Pascanu,et al. Theano: new features and speed improvements , 2012, ArXiv.
[19] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[20] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[21] Johannes Stallkamp,et al. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition , 2012, Neural Networks.
[22] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[23] Alex Graves,et al. Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.
[24] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[25] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, ArXiv.
[26] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[27] Rich Caruana,et al. Do Deep Nets Really Need to be Deep? , 2013, NIPS.
[28] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[29] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[30] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[31] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[32] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[33] Colin Raffel,et al. Lasagne: First release. , 2015 .
[34] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[35] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[36] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[37] B. Frey,et al. Predicting the sequence specificities of DNA- and RNA-binding proteins by deep learning , 2015, Nature Biotechnology.
[38] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[39] John Salvatier,et al. Theano: A Python framework for fast computation of mathematical expressions , 2016, ArXiv.
[40] J. Doug Tygar,et al. Evasion and Hardening of Tree Ensemble Classifiers , 2015, ICML.
[41] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[42] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[43] David Warde-Farley,et al. 1 Adversarial Perturbations of Deep Neural Networks , 2016 .
[44] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[45] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.