人工智能|人工智能与信息安全:新的革命与挑战( 六 )
[4]He,Kaiming,etal."Deepresiduallearningforimagerecognition."ProceedingsoftheIEEEconferenceoncomputervisionandpatternrecognition.2016.
[5]Vaswani,Ashish,etal."Attentionisallyouneed."arXivpreprintarXiv:1706.03762(2017).
[6]Mnih,Volodymyr,etal."Playingatariwithdeepreinforcementlearning."arXivpreprintarXiv:1312.5602(2013).
[7]Brown,Noam,etal."Combiningdeepreinforcementlearningandsearchforimperfect-informationgames."arXivpreprintarXiv:2007.13544(2020).
[8]Brown,TomB.,etal."Languagemodelsarefew-shotlearners."arXivpreprintarXiv:2005.14165(2020).
[9]CLIP:ConnectingTextandImages
[10]LearningtoConfuse:GeneratingTrainingTimeAdversarialDatawithAuto-Encoder.JiFeng,QizhiCai.ZhiHuaZhou.
[11]McMahan,Brendan,etal."Communication-efficientlearningofdeepnetworksfromdecentralizeddata."ArtificialIntelligenceandStatistics.PMLR,2017.
[12]Yang,Qiang,etal."Federatedmachinelearning:Conceptandapplications."ACMTransactionsonIntelligentSystemsandTechnology(TIST)10.2(2019):1-19.
[13]Goodfellow,IanJ.,JonathonShlens,andChristianSzegedy."Explainingandharnessingadversarialexamples."arXivpreprintarXiv:1412.6572(2014).
[14]Madry,Aleksander,etal."Towardsdeeplearningmodelsresistanttoadversarialattacks."arXivpreprintarXiv:1706.06083(2017).
[15]Carlini,Nicholas,andDavidWagner."Towardsevaluatingtherobustnessofneuralnetworks."2017ieeesymposiumonsecurityandprivacy(sp).IEEE,2017.
[16]Moosavi-Dezfooli,Seyed-Mohsen,AlhusseinFawzi,andPascalFrossard."Deepfool:asimpleandaccuratemethodtofooldeepneuralnetworks."ProceedingsoftheIEEEconferenceoncomputervisionandpatternrecognition.2016.
[17]Ma,Chen,LiChen,andJunhaiYong."MetaSimulator:SimulatingUnknownTargetModelsforQuery-EfficientBlack-boxAttacks."arXivpreprintarXiv:2009.00960(2020).
[18]Yin,Hongxu,etal."SeethroughGradients:ImageBatchRecoveryviaGradInversion."arXivpreprintarXiv:2104.07586(2021).
[19]GenerativeAdversarialNetworks.IanJ.Goodfellow,JeanPouget-Abadie?,MehdiMirza,BingXu,DavidWarde.SherjilOzair,AaronCourville,YoshuaBengio.
[20]Weaponizingdatascienceforsocialengineering:AutomatedE2EspearphishingonTwitter.
[21]DeepLearningforCyberVulnerabilityDiscovery:NGTFProjectScopingStudy.deVelO,HubczenkoD,KimJ,MontagueP,XiangY,PhungD,ZhangJ,MurrayT,LeT,WenS,LiuS,NguyenV,LinG,NguyenK,LeT,NguyenT,NockR,QuL.
[22]NeuralNetwork-basedGraphEmbeddingforCross-PlatformBinaryCodeSimilarityDetection.XiaojunXu,ChangLiu,QianFeng,HengYin,LeSong,DawnSong.
[23]NeuralReverseEngineeringofStrippedBinaries.YanivDavid.UriAlon.EranYahav.
[24]WEDL-NIDS:improvingnetworkintrusiondetectionusingwordembedding-baseddeeplearningmethod.Cui,J.,Long,J.,Min,E.,Mao,Y.
[25]AutonomousPenetrationTestingusingReinforcementLearning.JonathonSchwartz.
[26]NetworkTrafficAnomalyDetectionUsingShallowPacketInspectionandParallelK-meansDataClustering.RaduVelea.CasianCiobanu.LaurentiuMargarit.IonBica.
【人工智能|人工智能与信息安全:新的革命与挑战】来源:搜狐
- 副董事长|京东方A董秘回复:公司与全球数千家供应商保持着良好的合作关系
- 微信|个人收款码与商业收款码有什么不一样
- CPU|元宇宙+高端制造+人工智能!公司已投高科技超100亿,股价仅3元
- iqoo|iQOO Z5x兼备长续航与优质好屏,无压力畅玩游戏
- 任正非|任正非与孟晚舟的姓氏为什么不一样?
- 蓝思科技|苹果与34家中国供应商断绝合作,央视呼吁:尽快摆脱对苹果依赖
- 小米 11 Ultra 内测 NFC“读写勿扰”与“解锁后使用”功能
- 李现与eStar队员合影并晒签名队服 称“感谢冠军战队的礼物”
- 信息科学技术学院|瞧不起中国芯?芯片女神出手,30岁斩获国际大奖,让美国哑口无言
- 文和友|泡泡玛特与飞书达成合作 新消费代表企业加速迁移飞书