Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API
暂无分享,去创建一个
Radha Poovendran | Hossein Hosseini | Andrew Clark | Baicen Xiao | Andrew Clark | R. Poovendran | Baicen Xiao | Hossein Hosseini
[1] Farrokh Marvasti,et al. Real-Time Impulse Noise Suppression from Images Using an Efficient Weighted-Average Filtering , 2014, IEEE Signal Processing Letters.
[2] Kevin Knight,et al. Obfuscating Gender in Social Media Writing , 2016, NLP+CSS@EMNLP.
[3] S. Thorpe,et al. Speed of processing in the human visual system , 1996, Nature.
[4] Yi Yang,et al. Interactive Video Indexing With Statistical Active Learning , 2012, IEEE Transactions on Multimedia.
[5] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[6] S. Dehaene,et al. Brain Dynamics Underlying the Nonlinear Threshold for Access to Consciousness , 2007, PLoS biology.
[7] John Schulman,et al. Concrete Problems in AI Safety , 2016, ArXiv.
[8] Vasileios Mezaris,et al. Fast shot segmentation combining global and local visual descriptors , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[9] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[10] Ming Yang,et al. 3D Convolutional Neural Networks for Human Action Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[12] Andrew Zisserman,et al. Two-Stream Convolutional Networks for Action Recognition in Videos , 2014, NIPS.
[13] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[14] Fei-Fei Li,et al. Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[15] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[16] Ramakant Nevatia,et al. Temporal Localization of Fine-Grained Actions in Videos by Domain Transfer from Web Images , 2015, ACM Multimedia.
[17] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[18] Apostol Natsev,et al. YouTube-8M: A Large-Scale Video Classification Benchmark , 2016, ArXiv.
[19] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Allen Newell,et al. The psychology of human-computer interaction , 1983 .
[22] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[23] Horst Bischof,et al. A Duality Based Approach for Realtime TV-L1 Optical Flow , 2007, DAGM-Symposium.
[24] Bernard Ghanem,et al. ActivityNet: A large-scale video benchmark for human activity understanding , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[26] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[27] Christopher Joseph Pal,et al. Describing Videos by Exploiting Temporal Structure , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[28] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[29] Radha Poovendran,et al. Deceiving Google's Perspective API Built for Detecting Toxic Comments , 2017, ArXiv.
[30] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[31] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[32] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[33] Matthew J. Hausknecht,et al. Beyond short snippets: Deep networks for video classification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Bingbing Ni,et al. Assistive tagging: A survey of multimedia tagging with human-computer joint exploration , 2012, CSUR.
[35] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[36] Alan Hanjalic,et al. Shot-boundary detection: unraveled and resolved? , 2002, IEEE Trans. Circuits Syst. Video Technol..
[37] Peter G. J. Barten,et al. Contrast sensitivity of the human eye and its e ects on image quality , 1999 .
[38] Xi Wang,et al. Multi-Stream Multi-Class Fusion of Deep Networks for Video Classification , 2016, ACM Multimedia.
[39] Ting Yao,et al. Deep Learning for Video Classification and Captioning , 2016, Frontiers of Multimedia Research.
[40] Paul Over,et al. Video shot boundary detection: Seven years of TRECVid activity , 2010, Comput. Vis. Image Underst..
[41] Apostol Natsev,et al. Efficient Large Scale Video Classification , 2015, ArXiv.
[42] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[43] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[44] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[45] Amar Mitiche,et al. Reliable and fast structure-oriented video noise estimation , 2002, Proceedings. International Conference on Image Processing.
[46] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, Allerton.
[47] Brad Wyble,et al. Detecting meaning in RSVP at 13 ms per picture , 2013, Attention, perception & psychophysics.
[48] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[49] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[50] Yi Yang,et al. Hierarchical Recurrent Neural Encoder for Video Representation with Application to Captioning , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[52] Andrew Zisserman,et al. Convolutional Two-Stream Network Fusion for Video Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[53] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[54] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).