人工智能|人工智能与信息安全:新的革命与挑战( 六 )


[4]He,Kaiming,etal."Deepresiduallearningforimagerecognition."ProceedingsoftheIEEEconferenceoncomputervisionandpatternrecognition.2016.
[5]Vaswani,Ashish,etal."Attentionisallyouneed."arXivpreprintarXiv:1706.03762(2017).
[6]Mnih,Volodymyr,etal."Playingatariwithdeepreinforcementlearning."arXivpreprintarXiv:1312.5602(2013).
[7]Brown,Noam,etal."Combiningdeepreinforcementlearningandsearchforimperfect-informationgames."arXivpreprintarXiv:2007.13544(2020).
[8]Brown,TomB.,etal."Languagemodelsarefew-shotlearners."arXivpreprintarXiv:2005.14165(2020).
[9]CLIP:ConnectingTextandImages
[10]LearningtoConfuse:GeneratingTrainingTimeAdversarialDatawithAuto-Encoder.JiFeng,QizhiCai.ZhiHuaZhou.
[11]McMahan,Brendan,etal."Communication-efficientlearningofdeepnetworksfromdecentralizeddata."ArtificialIntelligenceandStatistics.PMLR,2017.
[12]Yang,Qiang,etal."Federatedmachinelearning:Conceptandapplications."ACMTransactionsonIntelligentSystemsandTechnology(TIST)10.2(2019):1-19.
[13]Goodfellow,IanJ.,JonathonShlens,andChristianSzegedy."Explainingandharnessingadversarialexamples."arXivpreprintarXiv:1412.6572(2014).
[14]Madry,Aleksander,etal."Towardsdeeplearningmodelsresistanttoadversarialattacks."arXivpreprintarXiv:1706.06083(2017).
[15]Carlini,Nicholas,andDavidWagner."Towardsevaluatingtherobustnessofneuralnetworks."2017ieeesymposiumonsecurityandprivacy(sp).IEEE,2017.
[16]Moosavi-Dezfooli,Seyed-Mohsen,AlhusseinFawzi,andPascalFrossard."Deepfool:asimpleandaccuratemethodtofooldeepneuralnetworks."ProceedingsoftheIEEEconferenceoncomputervisionandpatternrecognition.2016.
[17]Ma,Chen,LiChen,andJunhaiYong."MetaSimulator:SimulatingUnknownTargetModelsforQuery-EfficientBlack-boxAttacks."arXivpreprintarXiv:2009.00960(2020).
[18]Yin,Hongxu,etal."SeethroughGradients:ImageBatchRecoveryviaGradInversion."arXivpreprintarXiv:2104.07586(2021).
[19]GenerativeAdversarialNetworks.IanJ.Goodfellow,JeanPouget-Abadie?,MehdiMirza,BingXu,DavidWarde.SherjilOzair,AaronCourville,YoshuaBengio.
[20]Weaponizingdatascienceforsocialengineering:AutomatedE2EspearphishingonTwitter.
[21]DeepLearningforCyberVulnerabilityDiscovery:NGTFProjectScopingStudy.deVelO,HubczenkoD,KimJ,MontagueP,XiangY,PhungD,ZhangJ,MurrayT,LeT,WenS,LiuS,NguyenV,LinG,NguyenK,LeT,NguyenT,NockR,QuL.
[22]NeuralNetwork-basedGraphEmbeddingforCross-PlatformBinaryCodeSimilarityDetection.XiaojunXu,ChangLiu,QianFeng,HengYin,LeSong,DawnSong.
[23]NeuralReverseEngineeringofStrippedBinaries.YanivDavid.UriAlon.EranYahav.
[24]WEDL-NIDS:improvingnetworkintrusiondetectionusingwordembedding-baseddeeplearningmethod.Cui,J.,Long,J.,Min,E.,Mao,Y.
[25]AutonomousPenetrationTestingusingReinforcementLearning.JonathonSchwartz.
[26]NetworkTrafficAnomalyDetectionUsingShallowPacketInspectionandParallelK-meansDataClustering.RaduVelea.CasianCiobanu.LaurentiuMargarit.IonBica.
人工智能|人工智能与信息安全:新的革命与挑战】来源:搜狐