暂无分享,去创建一个
Ruoxi Chen | Ting Wang | Yue Yu | Zhaoyan Ming | Haibo Jin | Jinyin Chen | Yao Cheng | Chong Fu
[1] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[2] Nan Niu,et al. Deep Learning for Smart Sewer Systems: Assessing Nonfunctional Requirements , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS).
[3] Daniel Kroening,et al. Testing Deep Neural Networks , 2018, ArXiv.
[4] Lu Zhang,et al. Coverage Prediction for Accelerating Compiler Testing , 2021, IEEE Transactions on Software Engineering.
[5] James Bailey,et al. Clean-Label Backdoor Attacks on Video Recognition Models , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Lei Ma,et al. DeepHunter: a coverage-guided fuzz testing framework for deep neural networks , 2019, ISSTA.
[7] Matthew Wicker,et al. Feature-Guided Black-Box Safety Testing of Deep Neural Networks , 2017, TACAS.
[8] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[9] Simos Gerasimou,et al. Importance-Driven Deep Learning System Testing , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion).
[10] Hamed Pirsiavash,et al. Hidden Trigger Backdoor Attacks , 2019, AAAI.
[11] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[12] Ben Y. Zhao,et al. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[13] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[14] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[15] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[16] Benjamin Edwards,et al. Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering , 2018, SafeAI@AAAI.
[17] Xianglong Liu,et al. Understanding adversarial robustness via critical attacking route , 2021, Inf. Sci..
[18] Xingjun Ma,et al. RobOT: Robustness-Oriented Testing for Deep Learning Systems , 2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE).
[19] Nam Chul Kim,et al. Image retrieval using BDIP and BVLC moments , 2003, IEEE Trans. Circuits Syst. Video Technol..
[20] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[21] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Yunxin Liu,et al. DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection , 2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE).
[23] Damith Chinthana Ranasinghe,et al. STRIP: a defence against trojan attacks on deep neural networks , 2019, ACSAC.
[24] Guanhong Tao,et al. EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry , 2021, ArXiv.
[25] Stefan Berner,et al. Enhancing Software Testing by Judicious Use of Code Coverage Information , 2007, 29th International Conference on Software Engineering (ICSE'07).
[26] Chris J. Johannsen,et al. Ecological potentials in spectral signature analysis , 1969 .
[27] Wen-Chuan Lee,et al. NIC: Detecting Adversarial Samples with Neural Network Invariant Checking , 2019, NDSS.
[28] Gabriele Bavota,et al. Automatically assessing code understandability: How far are we? , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[29] Vitaly Shmatikov,et al. How To Backdoor Federated Learning , 2018, AISTATS.
[30] Zhu Wang,et al. Guided Test Case Generation through AI Enabled Output Space Exploration , 2018, 2018 IEEE/ACM 13th International Workshop on Automation of Software Test (AST).
[31] Gordon Fraser,et al. Whole Test Suite Generation , 2013, IEEE Transactions on Software Engineering.
[32] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[33] Reza Shokri,et al. Bypassing Backdoor Detection Algorithms in Deep Learning , 2019, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
[34] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[35] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[36] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[37] Lei Ma,et al. DeepMutation: Mutation Testing of Deep Learning Systems , 2018, 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE).
[38] Ali Farhadi,et al. You Only Look Once: Unified, Real-Time Object Detection , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Xianglong Liu,et al. Interpreting and Improving Adversarial Robustness of Deep Neural Networks With Neuron Sensitivity , 2021, IEEE Transactions on Image Processing.
[40] Tony Gorschek,et al. Searching for Cognitively Diverse Tests: Towards Universal Test Diversity Metrics , 2008, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop.
[41] Yunfei Liu,et al. Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks , 2020, ECCV.
[42] Benoit Baudry,et al. The Multiple Facets of Software Diversity , 2014, ACM Comput. Surv..
[43] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[44] Xiapu Luo,et al. A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models , 2019, CCS.
[45] Tudor Dumitras,et al. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.
[46] Lei Ma,et al. DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems , 2019, 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[47] J Hayhurst Kelly,et al. A Practical Tutorial on Modified Condition/Decision Coverage , 2001 .
[48] Ben Y. Zhao,et al. Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks , 2019, CCS.
[49] Alex Groce,et al. Code coverage for suite evaluation by developers , 2014, ICSE.
[50] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[51] Xiangyu Zhang,et al. ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation , 2019, CCS.
[52] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[53] Hiroyuki Sato,et al. GRT: Program-Analysis-Guided Random Testing (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[54] Michael Backes,et al. Dynamic Backdoor Attacks Against Machine Learning Models , 2020, ArXiv.