暂无分享,去创建一个
Yang Liu | Lei Ma | Xiaofei Xie | Alvin Chan | Felix Juefei-Xu | Yew Soon Ong | Xiaofei Xie | Yang Liu | Y. Ong | Lei Ma | Felix Juefei-Xu | Felix Juefei-Xu | Alvin Chan
[1] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[2] Arslan Munir,et al. Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks , 2017, MLDM.
[3] Dawn Xiaodong Song,et al. Decision Boundary Analysis of Adversarial Examples , 2018, ICLR.
[4] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[5] Lei Ma,et al. DeepHunter: Hunting Deep Neural Network Defects via Coverage-Guided Fuzzing , 2018, 1809.01266.
[6] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[7] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[8] Alex Graves,et al. Neural Turing Machines , 2014, ArXiv.
[9] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[10] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[11] Sergio Gomez Colmenarejo,et al. Hybrid computing using a neural network with dynamic external memory , 2016, Nature.
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[14] Jörg Franke,et al. Robust and Scalable Differentiable Neural Computer for Question Answering , 2018, QA@ACL.
[15] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[16] Sandy H. Huang,et al. Adversarial Attacks on Neural Network Policies , 2017, ICLR.
[17] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[18] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[19] Thomas Brox,et al. Adversarial Examples for Semantic Image Segmentation , 2017, ICLR.
[20] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[21] Baowen Xu,et al. Testing and validating machine learning classifiers by metamorphic testing , 2011, J. Syst. Softw..
[22] Colin Raffel,et al. Thermometer Encoding: One Hot Way To Resist Adversarial Examples , 2018, ICLR.
[23] Sameer Singh,et al. Generating Natural Adversarial Examples , 2017, ICLR.
[24] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[25] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[26] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[27] Mani B. Srivastava,et al. Generating Natural Language Adversarial Examples , 2018, EMNLP.
[28] John E. Kelly,et al. Smart Machines: IBM's Watson and the Era of Cognitive Computing , 2013 .
[29] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[30] Stefano Ermon,et al. Adversarial Examples for Natural Language Classification Problems , 2018 .
[31] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[32] Dawn Xiaodong Song,et al. Adversarial Examples for Generative Models , 2017, 2018 IEEE Security and Privacy Workshops (SPW).
[33] Tsong Yueh Chen,et al. Metamorphic Testing: A New Approach for Generating Next Test Cases , 2020, ArXiv.