暂无分享,去创建一个
Muhammad Shafique | Faiq Khalid | Muhammad Abdullah Hanif | Maurizio Martina | Alberto Marchisio | Giorgio Nanfa | M. Shafique | Faiq Khalid | M. Martina | Alberto Marchisio | Giorgio Nanfa
[1] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[2] Pranav Gokhale,et al. Applications of Convolutional Neural Networks , 2016 .
[3] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[4] Geoffrey E. Hinton,et al. Dynamic Routing Between Capsules , 2017, NIPS.
[5] Johannes Stallkamp,et al. Detection of traffic signs in real-world images: The German traffic sign detection benchmark , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).
[6] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[7] Geoffrey E. Hinton,et al. Transforming Auto-Encoders , 2011, ICANN.
[8] Rinat Mukhometzianov,et al. CapsNet comparative performance evaluation for image classification , 2018, ArXiv.
[9] Ryan R. Curtin,et al. Detecting Adversarial Samples from Artifacts , 2017, ArXiv.
[10] Tom Goldstein,et al. Are adversarial examples inevitable? , 2018, ICLR.
[11] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[12] Muhammad Abdullah Hanif,et al. X-TrainCaps: Accelerated Training of Capsule Nets through Lightweight Software Optimizations , 2019, ArXiv.
[13] Geoffrey E. Hinton,et al. DARCCC: Detecting Adversaries by Reconstruction from Class Conditional Capsules , 2018, ArXiv.
[14] Qiang Xu,et al. Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks , 2018, AAAI.
[15] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[16] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[17] Geoffrey E. Hinton,et al. Transforming Autoencoders , 2011 .
[18] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[19] Prateek Mittal,et al. Dimensionality Reduction as a Defense against Evasion Attacks on Machine Learning Classifiers , 2017, ArXiv.
[20] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[21] Daniel Cullina,et al. Enhancing robustness of machine learning systems via data transformations , 2017, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[22] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[23] Amara Dinesh Kumar,et al. Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks , 2018, ArXiv.
[24] Geoffrey E. Hinton,et al. Matrix capsules with EM routing , 2018, ICLR.
[25] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[26] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.