暂无分享,去创建一个
Rauf Izmailov | Shridatt Sugrim | Blerta Lindqvist | R. Izmailov | Shridatt Sugrim | Blerta Lindqvist
[1] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[2] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[3] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[4] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[5] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[6] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[7] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[8] Dawn Xiaodong Song,et al. Adversarial Examples for Generative Models , 2017, 2018 IEEE Security and Privacy Workshops (SPW).
[9] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[10] Somesh Jha,et al. Detecting Adversarial Examples Using Data Manifolds , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[11] Ian S. Fischer,et al. Adversarial Transformation Networks: Learning to Generate Adversarial Examples , 2017, ArXiv.
[12] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[13] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[14] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[15] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[16] Ananthram Swami,et al. Enablers of Adversarial Attacks in Machine Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[17] Dan Boneh,et al. The Space of Transferable Adversarial Examples , 2017, ArXiv.
[18] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[19] Alexei A. Efros,et al. Generative Visual Manipulation on the Natural Image Manifold , 2016, ECCV.
[20] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[21] U. Rajendra Acharya,et al. Deep learning for healthcare applications based on physiological signals: A review , 2018, Comput. Methods Programs Biomed..
[22] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[23] Jinjun Chen,et al. Detection of Malicious Code Variants Based on Deep Learning , 2018, IEEE Transactions on Industrial Informatics.
[24] Augustus Odena,et al. Semi-Supervised Learning with Generative Adversarial Networks , 2016, ArXiv.
[25] Mingyan Liu,et al. Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.
[26] Shin Ishii,et al. Virtual Adversarial Training: A Regularization Method for Supervised and Semi-Supervised Learning , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[28] Yang Song,et al. PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples , 2017, ICLR.
[29] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[30] Ian J. Goodfellow,et al. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library , 2016 .
[31] John Schulman,et al. Concrete Problems in AI Safety , 2016, ArXiv.
[32] David J. Fleet,et al. Adversarial Manipulation of Deep Representations , 2015, ICLR.