1 N. Papernot, "Transferability in machine learning from phenomena to black-box attacks using adversarial samples"
2 N. Carlini, "Towards evaluating the robustness of neural networks" 39-57, 2017
3 N. Papernot, "The limitations of deep learning in adversarial settings" 372-387, 2016
4 M. Abadi, "Tensorlfow: A system for large-scale machine learning" 265-283, 2016
5 Y. Lecun, "Shape, contour and grouping in computer vision" Springer 319-345, 1999
6 S. Qiu, "Review of artificial intelligence adversarial attack and defense technologies" 9 (9): 909-938, 2019
7 N. Papernot, "Practical black-box attacks a gainst machine learning" 506-519, 2017
8 D. Bertsekas, "Nonlinear programming" 48 (48): 334-, 1997
9 H. Sak, "Long short-term memory recurrent neural network architectures for large scale acoustic modeling" 338-342, 2014
10 H. Sak, "Long short-term memory based recur rent neural network architectures for large vocabulary speech recognition"
1 N. Papernot, "Transferability in machine learning from phenomena to black-box attacks using adversarial samples"
2 N. Carlini, "Towards evaluating the robustness of neural networks" 39-57, 2017
3 N. Papernot, "The limitations of deep learning in adversarial settings" 372-387, 2016
4 M. Abadi, "Tensorlfow: A system for large-scale machine learning" 265-283, 2016
5 Y. Lecun, "Shape, contour and grouping in computer vision" Springer 319-345, 1999
6 S. Qiu, "Review of artificial intelligence adversarial attack and defense technologies" 9 (9): 909-938, 2019
7 N. Papernot, "Practical black-box attacks a gainst machine learning" 506-519, 2017
8 D. Bertsekas, "Nonlinear programming" 48 (48): 334-, 1997
9 H. Sak, "Long short-term memory recurrent neural network architectures for large scale acoustic modeling" 338-342, 2014
10 H. Sak, "Long short-term memory based recur rent neural network architectures for large vocabulary speech recognition"
11 L. Bottou, "Large-scale machine learning with stochastic gradient descent" Physica-Verlag HD 177-186, 2010
12 C. Szegedy, "Intriguing properites of neural networks"
13 A. Krizhevsky, "Imagenet classification with deep convolutional neural networks" 1 : 1097-1105, 2012
14 I. Goodfellow, "Explaining and harnessing adversarial examples"
15 B. Biggio, "Evasion attacks against machine learning at test time" 387-402, 2013
16 R. Caruana, "Ensemble selection from libraries of models" ACM 18-, 2004
17 Y. Liu, "Delving into transferable adversarial examples and black-box attacks"
18 X. Gao, "Boosting targeted black-box attacks via ensemble substitute training and linear augmentation" 9 (9): 2286-2300, 2019
19 L. Huang, "Adversarial machine learning" 43-58, 2011
20 X. Yuan, "Adversarial examples : attacks and defenses for deep learning" 9 (9): 2805-2824, 2019
21 D. Kingma, "Adam: A method for stochastic optimization"