Author:
Sarpatwar Kanthi,Vaculin Roman,Min Hong,Su Gong,Heath Terry,Ganapavarapu Giridhar,Dillenberger Donna
Publisher
Springer International Publishing
Reference30 articles.
1. Mehri, V.A., Tutschku, K.: Flexible privacy and high trust in the next generation internet-the use case of a cloud-based marketplace for AI. In: Swedish National Computer Networking Workshop (2017)
2. Athalye, A., Sutskever, I.: Synthesizing robust adversarial examples. arXiv preprint
arXiv:1707.07397
(2017)
3. Baracaldo, N., Chen, B., Ludwig, H., Safavi, J.A.: Mitigating poisoning attacks on machine learning models: a data provenance based approach. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 103–110. ACM (2017)
4. Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16–25. ACM (2006)
5. Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: 2013 International Conference on Biometrics (ICB), pp. 1–7. IEEE (2013)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献