|
[1]
|
Goodfellow, I., Yoshua, B. and Aaron, C. (2016) Deep Learning. MIT Press, Boston.
|
|
[2]
|
Webb, S. (2018) Deep Learning for Biology. Nature, 554, 555-557. [Google Scholar] [CrossRef] [PubMed]
|
|
[3]
|
Branson, K. (2018) A Deep (Learning) Dive into a Cell. Nature Methods, 15, 253-254. [Google Scholar] [CrossRef] [PubMed]
|
|
[4]
|
Deng, Y., Bao, F., Kong, Y.Y., et al. (2017) Deep Direct Reinforcement Learning for Financial Signal Representation and Trading. IEEE Transactions on Neural Networks and Learning Sys-tems, 28, 653-664. [Google Scholar] [CrossRef]
|
|
[5]
|
He, Y., Zhao, N. and Yin, H.X. (2018) Integrated Networking, Caching, and Computing for Connected Vehicles: A Deep Reinforcement Learning Approach. IEEE Transactions on Ve-hicular Technology, 67, 44-55. [Google Scholar] [CrossRef]
|
|
[6]
|
Goodfellow, I., Shlens, J. and Christian, S. (2015) Explaining and Harnessing Adversarial Examples.
https://arxiv.org/abs/1412.6572
|
|
[7]
|
Thys, S., Van Ranst, W. and Goedemé, T. (2019) Fooling Automated Sur-veillance Cameras: Adversarial Patches to Attack Person Detection. https://arxiv.org/pdf/1904.08653.pdf
|
|
[8]
|
Tencent Keen Security Lab. (2019) Experimental Security Research of Tesla Autopi-lot.
|
|
[9]
|
https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf.
|
|
[10]
|
Papernot, N., Mcdaniel, P., Goodfellow, I., et al. (2016) Practical Black-Box Attacks against Machine Learning.
https://arxiv.org/abs/1602.02697
|
|
[11]
|
Kurakin, A., Goodfellow, I. and Bengio, S. (2018) Adversarial Examples in the Physical World.
https://arxiv.org/abs/1805.10997
|
|
[12]
|
Huang, S., Papernot, N., Goodfellow, I., Duany, Y. and Abbeel, P. (2017) Adversarial Attacks on Neural Network Policies. https://arxiv.org/abs/1702.02284v1
|
|
[13]
|
Tramer, F., Goodfellow, I., Boneh, D., et al. (2017) Ensemble Adversarial Training: Attacks and Defenses.
https://arxiv.org/abs/1705.07204
|
|
[14]
|
Moosavidezfooli, S., Fawzi, A. and Frossard, P. (2015) DeepFool: A Sim-ple and Accurate Method to Fool Deep Neural Networks. https://arxiv.org/abs/1511.04599
|
|
[15]
|
Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., BerkayCelik, Z. and Swami, A. (2016) The Limitations of Deep Learning in Ad-versarial Settings. IEEE European Symposium on Security and Privacy, Saarbrücken, 21-24 March 2016, 372-387. [Google Scholar] [CrossRef]
|
|
[16]
|
Nicholas, D.W. (2017) Towards Evaluating the Robustness of Neural Networks. https://arxiv.org/pdf/1608.04644.pdf
|
|
[17]
|
Baidu xlab. AdvBox. https://github.com/baidu/AdvBox
|
|
[18]
|
Stanford Vision Lab. ImageNet. http://www.image-net.org
|
|
[19]
|
Fawzi, A., Fawzi, O. and Frossard, P. (2015) Fundamental Limits on Adversarial Robustness.
http://www.alhusseinfawzi.info/papers/workshop_dl.pdf
|
|
[20]
|
Guo, C., Rana, M., Cisse, M. and Maaten, L. (2018) Countering Adversarial Images Using Input Transformations.
https://arxiv.org/abs/1711.00117
|