1. Ka Ho Chow and Wenqi Wei and Yanzhao Wu and Ling Liu (2019) Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. {IEEE}, https://doi.org/10.1109/BigData47090.2019.9006090, Fri, 06 Mar 2020 00:00:00 +0100, 1282--1291, 10.1109/BigData47090.2019.9006090, 2019 {IEEE} International Conference on Big Data (Big Data), Los Angeles, CA, USA, December 9-12, 2019, https://dblp.org/rec/conf/bigdataconf/ChowWW019.bib, dblp computer science bibliography, https://dblp.org
2. Ka Ho Chow and Wenqi Wei and Yanzhao Wu and Ling Liu (2019) Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. {IEEE}, https://doi.org/10.1109/BigData47090.2019.9006090, Fri, 06 Mar 2020 00:00:00 +0100, 1282--1291, 10.1109/BigData47090.2019.9006090, 2019 {IEEE} International Conference on Big Data (Big Data), Los Angeles, CA, USA, December 9-12, 2019, https://dblp.org/rec/conf/bigdataconf/ChowWW019.bib, dblp computer science bibliography, https://dblp.org
3. Xu, Weilin and Evans, David and Qi, Yanjun (2017) Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 https://arxiv.org/abs/1704.01155
4. Bhagoji, Arjun Nitin and Cullina, Daniel and Sitawarin, Chawin and Mittal, Prateek (2018) Enhancing robustness of machine learning systems via data transformations. 1--5, IEEE, 2018 52nd Annual Conference on Information Sciences and Systems (CISS)
5. Meng, Dongyu and Chen, Hao (2017) Magnet: a two-pronged defense against adversarial examples. 135--147, Proceedings of the 2017 ACM SIGSAC conference on computer and communications security