Radioactive data: tracing through training
暂无分享,去创建一个
Cordelia Schmid | Matthijs Douze | Alexandre Sablayrolles | Herv'e J'egou | C. Schmid | Alexandre Sablayrolles | Matthijs Douze | Herv'e J'egou
[1] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[2] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[3] David A. Shamma,et al. YFCC100M , 2015, Commun. ACM.
[4] Jerry Li,et al. Spectral Signatures in Backdoor Attacks , 2018, NeurIPS.
[5] Naftali Tishby,et al. The information bottleneck method , 2000, ArXiv.
[6] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[7] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[8] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[9] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[10] Siddharth Garg,et al. BadNets: Evaluating Backdooring Attacks on Deep Neural Networks , 2019, IEEE Access.
[11] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[12] Alexei A. Efros,et al. Unbiased look at dataset bias , 2011, CVPR 2011.
[13] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[14] Úlfar Erlingsson,et al. Scalable Private Learning with PATE , 2018, ICLR.
[15] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[16] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[17] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] M. Kendall. Statistical Methods for Research Workers , 1937, Nature.
[19] Bolei Zhou,et al. Learning Deep Features for Scene Recognition using Places Database , 2014, NIPS.
[20] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[21] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[22] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[23] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[24] Cordelia Schmid,et al. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference , 2019, ICML.
[25] Tudor Dumitras,et al. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.
[26] Kaiming He,et al. Accurate, Large Minibatch SGD: Training ImageNet in 1 Hour , 2017, ArXiv.
[27] Allan Jabri,et al. Learning Visual Features from Large Weakly Supervised Data , 2015, ECCV.
[28] Julien Mairal,et al. Unsupervised Pre-Training of Image Features on Non-Curated Data , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[29] Percy Liang,et al. Certified Defenses for Data Poisoning Attacks , 2017, NIPS.
[30] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[31] Kaiming He,et al. Exploring the Limits of Weakly Supervised Pretraining , 2018, ECCV.
[32] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[33] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[34] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[35] Úlfar Erlingsson,et al. The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets , 2018, ArXiv.
[36] Michael Rabbat,et al. Memory Vectors for Similarity Search in High-Dimensional Spaces , 2014, IEEE Transactions on Big Data.
[37] Teddy Furon,et al. Are Deep Neural Networks good for blind image watermarking? , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[38] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[39] David A. Shamma,et al. The New Data and New Challenges in Multimedia Research , 2015, ArXiv.
[40] Benny Pinkas,et al. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring , 2018, USENIX Security Symposium.