-
1
-
-
84876231242
-
Imagenet classification with deep convolutional neural networks
-
A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, 2012, pp. 1097-1105
-
(2012)
Advances in Neural Information Processing Systems
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.E.3
-
2
-
-
84890525984
-
Deep convolutional neural networks for lvcsr
-
T. N. Sainath, A.-r. Mohamed, B. Kingsbury, and B. Ramabhadran, "Deep convolutional neural networks for lvcsr," in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 2013, pp. 8614-8618
-
(2013)
Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On. IEEE
, pp. 8614-8618
-
-
Sainath, T.N.1
Mohamed, A.-R.2
Kingsbury, B.3
Ramabhadran, B.4
-
3
-
-
85083951635
-
Overfeat: Integrated recognition, localization and detection using convolutional networks
-
arXiv preprint arXiv:1312.6229
-
P. Sermanet, D. Eigen, X. Zhang, M. Mathieu, R. Fergus, and Y. Le-Cun, "Overfeat: Integrated recognition, localization and detection using convolutional networks," in International Conference on Learning Representations (ICLR 2014). arXiv preprint arXiv:1312.6229, 2014
-
(2014)
International Conference on Learning Representations (ICLR 2014)
-
-
Sermanet, P.1
Eigen, D.2
Zhang, X.3
Mathieu, M.4
Fergus, R.5
Le-Cun, Y.6
-
4
-
-
84890516914
-
Large-scale malware classification using random projections and neural networks
-
G. E. Dahl, J. W. Stokes, L. Deng, and D. Yu, "Large-scale malware classification using random projections and neural networks," in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 2013, pp. 3422-3426
-
(2013)
Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference On. IEEE
, pp. 3422-3426
-
-
Dahl, G.E.1
Stokes, J.W.2
Deng, L.3
Yu, D.4
-
5
-
-
84907310376
-
Droid-sec: Deep learning in android malware detection
-
Z. Yuan, Y. Lu, Z. Wang, and Y. Xue, "Droid-sec: deep learning in android malware detection," in Proceedings of the 2014 ACM conference on SIGCOMM. ACM, 2014, pp. 371-372
-
(2014)
Proceedings of the 2014 ACM Conference on SIGCOMM. ACM
, pp. 371-372
-
-
Yuan, Z.1
Lu, Y.2
Wang, Z.3
Xue, Y.4
-
7
-
-
84978047763
-
The limitations of deep learning in adversarial settings
-
N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, "The limitations of deep learning in adversarial settings," in Proceedings of the 1st IEEE European Symposium on Security and Privacy. IEEE, 2016
-
(2016)
Proceedings of the 1st IEEE European Symposium on Security and Privacy. IEEE
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Fredrikson, M.4
Celik, Z.B.5
Swami, A.6
-
8
-
-
85083953343
-
Intriguing properties of neural networks
-
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, "Intriguing properties of neural networks," in Proceedings of the 2014 International Conference on Learning Representations. Computational and Biological Learning Society, 2014
-
(2014)
Proceedings of the 2014 International Conference on Learning Representations. Computational and Biological Learning Society
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
Goodfellow, I.6
Fergus, R.7
-
12
-
-
80955143573
-
Adversarial machine learning
-
L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. Tygar, "Adversarial machine learning," in Proceedings of the 4th ACM workshop on Security and artificial intelligence. ACM, 2011, pp. 43-58
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. ACM
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.I.4
Tygar, J.5
-
13
-
-
84988423255
-
Pattern recognition systems under attack: Design issues and research challenges
-
B. Biggio, G. Fumera et al., "Pattern recognition systems under attack: Design issues and research challenges," International Journal of Pattern Recognition and Artificial Intelligence, vol. 28, no. 07, p. 1460002, 2014
-
(2014)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.28
, Issue.7
, pp. 1460002
-
-
Biggio, B.1
Fumera, G.2
-
14
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Springer
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson et al., "Evasion attacks against machine learning at test time," in Machine Learning and Knowledge Discovery in Databases. Springer, 2013, pp. 387-402
-
(2013)
Machine Learning and Knowledge Discovery in Databases
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
-
22
-
-
84944735469
-
-
book in preparation for MIT Press
-
Y. Bengio, I. J. Goodfellow, and A. Courville, "Deep learning," 2015, book in preparation for MIT Press. [Online]. Available: http://www.iro.umontreal.ca/bengioy/dlbook
-
(2015)
Deep Learning
-
-
Bengio, Y.1
Goodfellow, I.J.2
Courville, A.3
-
23
-
-
35348818718
-
Learning multiple layers of representation
-
G. E. Hinton, "Learning multiple layers of representation," Trends in cognitive sciences, vol. 11, no. 10, pp. 428-434, 2007
-
(2007)
Trends in Cognitive Sciences
, vol.11
, Issue.10
, pp. 428-434
-
-
Hinton, G.E.1
-
24
-
-
84921817164
-
Learning representations by back-propagating errors
-
D. E. Rumelhart, G. E. Hinton, and R. J. Williams, "Learning representations by back-propagating errors," Cognitive modeling, vol. 5, 1988
-
(1988)
Cognitive Modeling
, vol.5
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
25
-
-
84857855190
-
Random search for hyper-parameter optimization
-
J. Bergstra and Y. Bengio, "Random search for hyper-parameter optimization," The Journal of Machine Learning Research, vol. 13, no. 1, pp. 281-305, 2012
-
(2012)
The Journal of Machine Learning Research
, vol.13
, Issue.1
, pp. 281-305
-
-
Bergstra, J.1
Bengio, Y.2
-
26
-
-
80053443013
-
Domain adaptation for largescale sentiment classification: A deep learning approach
-
X. Glorot, A. Bordes, and Y. Bengio, "Domain adaptation for largescale sentiment classification: A deep learning approach," in Proceedings of the 28th International Conference on Machine Learning (ICML-11), 2011, pp. 513-520
-
(2011)
Proceedings of the 28th International Conference on Machine Learning (ICML-11)
, pp. 513-520
-
-
Glorot, X.1
Bordes, A.2
Bengio, Y.3
-
27
-
-
79959353548
-
Stacked convolutional autoencoders for hierarchical feature extraction
-
Springer
-
J. Masci, U. Meier, D. Ciresan et al., "Stacked convolutional autoencoders for hierarchical feature extraction," in Artificial Neural Networks and Machine Learning-ICANN 2011. Springer, 2011, pp. 52-59
-
(2011)
Artificial Neural Networks and Machine Learning-ICANN 2011
, pp. 52-59
-
-
Masci, J.1
Meier, U.2
Ciresan, D.3
-
28
-
-
77949522811
-
Why does unsupervised pre-training help deep learning?
-
D. Erhan, Y. Bengio, A. Courville, P.-A. Manzagol, P. Vincent, and S. Bengio, "Why does unsupervised pre-training help deep learning?" The Journal of Machine Learning Research, vol. 11, pp. 625-660, 2010
-
(2010)
The Journal of Machine Learning Research
, vol.11
, pp. 625-660
-
-
Erhan, D.1
Bengio, Y.2
Courville, A.3
Manzagol, P.-A.4
Vincent, P.5
Bengio, S.6
-
29
-
-
84987597833
-
Distributional smoothing by virtual adversarial examples
-
abs/1507.00677
-
T. Miyato, S. Maeda, M. Koyama et al., "Distributional smoothing by virtual adversarial examples," CoRR, vol. abs/1507.00677, 2015
-
(2015)
CoRR
-
-
Miyato, T.1
Maeda, S.2
Koyama, M.3
-
30
-
-
84987603289
-
Analysis of classifiers' robustness to adversarial perturbations
-
arXiv preprint arXiv:1502.02590
-
A. Fawzi, O. Fawzi, and P. Frossard, "Analysis of classifiers' robustness to adversarial perturbations," in Deep Learning Workshop at ICML 2015. arXiv preprint arXiv:1502.02590, 2015
-
(2015)
Deep Learning Workshop at ICML 2015
-
-
Fawzi, A.1
Fawzi, O.2
Frossard, P.3
-
31
-
-
0026953305
-
Improving generalization performance using double backpropagation
-
H. Drucker and Y. Le Cun, "Improving generalization performance using double backpropagation," Neural Networks, IEEE Transactions on, vol. 3, no. 6, pp. 991-997, 1992
-
(1992)
Neural Networks, IEEE Transactions on
, vol.3
, Issue.6
, pp. 991-997
-
-
Drucker, H.1
Le Cun, Y.2
-
33
-
-
34249836711
-
Approximation by superpositions of a sigmoidal function
-
G. Cybenko, "Approximation by superpositions of a sigmoidal function," Mathematics of Control, Signals, and Systems, vol. 5, no. 4, p. 455, 1992
-
(1992)
Mathematics of Control, Signals, and Systems
, vol.5
, Issue.4
, pp. 455
-
-
Cybenko, G.1
-
34
-
-
78649409695
-
Learnability, stability and uniform convergence
-
S. Shalev-Shwartz, O. Shamir, N. Srebro, and K. Sridharan, "Learnability, stability and uniform convergence," The Journal of Machine Learning Research, vol. 11, pp. 2635-2670, 2010
-
(2010)
The Journal of Machine Learning Research
, vol.11
, pp. 2635-2670
-
-
Shalev-Shwartz, S.1
Shamir, O.2
Srebro, N.3
Sridharan, K.4
-
35
-
-
84857819132
-
Theano: A cpu and GPU math expression compiler
-
Austin, TX
-
J. Bergstra, O. Breuleux, F. Bastien, P. Lamblin, R. Pascanu, G. Desjardins, J. Turian, D. Warde-Farley, and Y. Bengio, "Theano: a cpu and gpu math expression compiler," in Proceedings of the Python for scientific computing conference (SciPy), vol. 4. Austin, TX, 2010, p. 3
-
(2010)
Proceedings of the Python for Scientific Computing Conference (SciPy)
, vol.4
, pp. 3
-
-
Bergstra, J.1
Breuleux, O.2
Bastien, F.3
Lamblin, P.4
Pascanu, R.5
Desjardins, G.6
Turian, J.7
Warde-Farley, D.8
Bengio, Y.9
-
36
-
-
84987616193
-
-
E. Battenberg, S. Dieleman, D. Nouri, E. Olson, A. van den Oord, C. Raffel, J. Schlter, and S. Kaae Snderby, "Lasagne: Lightweight library to build and train neural networks in theano," 2015. [Online]. Available: https://github.com/Lasagne/Lasagne
-
(2015)
Lasagne: Lightweight Library to Build and Train Neural Networks in Theano
-
-
Battenberg, E.1
Dieleman, S.2
Nouri, D.3
Olson, E.4
Vanden Oord, A.5
Raffel, C.6
Schlter, J.7
Kaae Snderby, S.8
-
37
-
-
84937712787
-
Poisoning behavioral malware clustering
-
B. Biggio, K. Rieck, D. Ariu, C. Wressnegger et al., "Poisoning behavioral malware clustering," in Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop. ACM, 2014, pp. 27-36
-
(2014)
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop. ACM
, pp. 27-36
-
-
Biggio, B.1
Rieck, K.2
Ariu, D.3
Wressnegger, C.4
-
38
-
-
84987616197
-
Adversarial perturbations of deep neural networks
-
T. Hazan, G. Papandreou, and D. Tarlow, Eds
-
D. Warde-Farley and I. Goodfellow, "Adversarial perturbations of deep neural networks," in Advanced Structured Prediction, T. Hazan, G. Papandreou, and D. Tarlow, Eds., 2016
-
(2016)
Advanced Structured Prediction
-
-
Warde-Farley, D.1
Goodfellow, I.2
-
39
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. D. Joseph, and J. Tygar, "The security of machine learning," Machine Learning, vol. 81, no. 2, pp. 121-148, 2010
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.4
-
41
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar, "Can machine learning be secure?" in Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ACM, 2006, pp. 16-25
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
42
-
-
84992268362
-
Security evaluation of pattern classifiers under attack
-
B. Biggio, G. Fumera, and F. Roli, "Security evaluation of pattern classifiers under attack," Knowledge and Data Engineering, IEEE Transactions on, vol. 26, no. 4, pp. 984-996, 2014
-
(2014)
Knowledge and Data Engineering, IEEE Transactions on
, vol.26
, Issue.4
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
44
-
-
84867112504
-
Support vector machines under adversarial label noise
-
B. Biggio, B. Nelson, and P. Laskov, "Support vector machines under adversarial label noise." in ACML, 2011, pp. 97-112
-
(2011)
ACML
, pp. 97-112
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
|