暂无分享,去创建一个
[1] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[2] A. Hammer. Project title: , 1999 .
[3] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[4] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[5] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[6] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Miriam A. M. Capretz,et al. MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[9] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[10] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[11] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[12] Radha Poovendran,et al. Deceiving Google's Perspective API Built for Detecting Toxic Comments , 2017, ArXiv.
[13] Sandy H. Huang,et al. Adversarial Attacks on Neural Network Policies , 2017, ICLR.
[14] Dawn Xiaodong Song,et al. Adversarial Examples for Generative Models , 2017, 2018 IEEE Security and Privacy Workshops (SPW).
[15] Xirong Li,et al. Deep Text Classification Can be Fooled , 2017, IJCAI.