-
1
-
-
78049530550
-
The security of machine learning
-
(2010)
-
Marco Barreno, Blaine Nelson, Anthony D Joseph, and JD Tygar. 2010. The security of machine learning. Machine Learning 81, 2 (2010), 121-148.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
2
-
-
33845989821
-
Can machine learning be secure?
-
ACM
-
Marco Barreno, Blaine Nelson, Russell Sears, Anthony D Joseph, and J Doug Tygar. 2006. Can machine learning be secure?. In Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ACM, 16-25.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Doug Tygar, J.5
-
4
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Springer
-
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Šrndić, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 387-402.
-
(2013)
Joint European Conference on Machine Learning and Knowledge Discovery in Databases
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
9
-
-
85037362949
-
-
arXiv preprint (2017)
-
Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust Physical-World Attacks on Machine Learning Models. arXiv preprint arXiv:1707.08945 (2017).
-
(2017)
Robust Physical-World Attacks on Machine Learning Models
-
-
Evtimov, I.1
Eykholt, K.2
Fernandes, E.3
Kohno, T.4
Li, B.5
Prakash, A.6
Rahmati, A.7
Song, D.8
-
11
-
-
84892854517
-
Stochastic first-and zeroth-order methods for nonconvex stochastic programming
-
(2013)
-
Saeed Ghadimi and Guanghui Lan. 2013. Stochastic first-and zeroth-order methods for nonconvex stochastic programming. SIAM Journal on Optimization 23, 4 (2013), 2341-2368.
-
(2013)
SIAM Journal on Optimization
, vol.23
, Issue.4
, pp. 2341-2368
-
-
Ghadimi, S.1
Lan, G.2
-
24
-
-
84930630277
-
Deep learning
-
(2015)
-
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553(2015), 436-444.
-
(2015)
Nature
, vol.521
, Issue.7553
, pp. 436-444
-
-
LeCun, Y.1
Bengio, Y.2
Hinton, G.3
-
25
-
-
85014547151
-
A comprehensive linear speedup analysis for asynchronous stochastic parallel optimization from zeroth-order to first-order
-
Xiangru Lian, Huan Zhang, Cho-Jui Hsieh, Yijun Huang, and Ji Liu. 2016. A comprehensive linear speedup analysis for asynchronous stochastic parallel optimization from zeroth-order to first-order. In Advances in Neural Information Processing Systems. 3054-3062.
-
(2016)
Advances in Neural Information Processing Systems
, pp. 3054-3062
-
-
Lian, X.1
Zhang, H.2
Hsieh, C.-J.3
Huang, Y.4
Liu, J.5
-
32
-
-
84860610528
-
Random gradient-free minimization of convex functions
-
Center for Operations Research and Econometrics (CORE)
-
Yurii Nesterov et al. 2011. Random gradient-free minimization of convex functions. Technical Report. Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
-
(2011)
Technical Report. Université Catholique de Louvain
-
-
Nesterov, Y.1
-
35
-
-
85021992078
-
Practical black-box attacks against machine learning
-
ACM
-
Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2017. Practical black-box attacks against machine learning. In Proceedings of the ACM on Asia Conference on Computer and Communications Security. ACM, 506-519.
-
(2017)
Proceedings of the ACM on Asia Conference on Computer and Communications Security
, pp. 506-519
-
-
Papernot, N.1
McDaniel, P.2
Goodfellow, I.3
Jha, S.4
Berkay Celik, Z.5
Swami, A.6
-
36
-
-
84978047763
-
The limitations of deep learning in adversarial settings
-
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In IEEE European Symposium on Security and Privacy (EuroS&P). 372-387.
-
(2016)
IEEE European Symposium on Security and Privacy (EuroS&P)
, pp. 372-387
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Fredrikson, M.4
Berkay Celik, Z.5
Swami, A.6
-
38
-
-
84987680683
-
Distillation as a defense to adversarial perturbations against deep neural networks
-
Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. 2016. Distillation as a defense to adversarial perturbations against deep neural networks. In IEEE Symposium on Security and Privacy (SP). 582-597.
-
(2016)
IEEE Symposium on Security and Privacy (SP)
, pp. 582-597
-
-
Papernot, N.1
McDaniel, P.2
Wu, X.3
Jha, S.4
Swami, A.5
-
39
-
-
84986296808
-
Rethinking the inception architecture for computer vision
-
Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. 2016. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2818-2826.
-
(2016)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
, pp. 2818-2826
-
-
Szegedy, C.1
Vanhoucke, V.2
Ioffe, S.3
Shlens, J.4
Wojna, Z.5
-
40
-
-
84908877742
-
Intriguing properties of neural networks
-
arXiv preprint (2013)
-
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).
-
(2013)
Ian Goodfellow, and Rob Fergus
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
|