Affiliation:
1. Idein Inc.
2. National Institute of Advanced Industrial Science and Technology (AIST)
3. The University of Tokyo
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference35 articles.
1. [1] J. Janai, F. Güney, A. Behl, and A. Geiger, “Computer vision for autonomous vehicles: Problems, datasets and state-of-the-art,” arXiv preprint arXiv:1704.05519, 2017.
2. [2] B. Kolosnjaji, A. Zarras, G. Webster, and C. Eckert, “Deep Learning for Classification of Malware System Call Sequences,” 29th Australasian Joint Conference on Artificial Intelligence (AI), vol.9992, pp.137-149, Dec. 2016. 10.1007/978-3-319-50127-7_11
3. [3] J. Saxe and K. Berlin, “Deep neural network based malware detection using two dimensional binary program features,” 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.11-20, IEEE, 2015. 10.1109/malware.2015.7413680
4. [4] M. Barreno, B. Nelson, A.D. Joseph, and J. Tygar, “The security of machine learning,” Machine Learning, vol.81, no.2, pp.121-148, 2010. 10.1007/s10994-010-5188-5
5. [5] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of neural networks,” International Conference on Learning Representations (ICLR), 2014.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献