Adversarial-Machine-Learnin.../references/references.bbl
2024-05-01 18:11:38 -04:00

292 lines
11 KiB
Plaintext

% $ biblatex auxiliary file $
% $ biblatex bbl format version 3.2 $
% Do not modify the above lines!
%
% This is an auxiliary file used by the 'biblatex' package.
% This file may safely be deleted. It will be recreated by
% biber as required.
%
\begingroup
\makeatletter
\@ifundefined{ver@biblatex.sty}
{\@latex@error
{Missing 'biblatex' package}
{The bibliography requires the 'biblatex' package.}
\aftergroup\endinput}
{}
\endgroup
\refsection{0}
\datalist[entry]{nty/global//global/global}
\entry{carlini2017evaluating}{misc}{}
\name{author}{2}{}{%
{{hash=93330b46aec6ec2750a8adced7fef821}{%
family={Carlini},
familyi={C\bibinitperiod},
given={Nicholas},
giveni={N\bibinitperiod}}}%
{{hash=45a593fbd4e5b2f4d60199ccfdb4fe59}{%
family={Wagner},
familyi={W\bibinitperiod},
given={David},
giveni={D\bibinitperiod}}}%
}
\strng{namehash}{1841abd848ac2f8ced0f1b456d15ec8c}
\strng{fullhash}{1841abd848ac2f8ced0f1b456d15ec8c}
\strng{bibnamehash}{1841abd848ac2f8ced0f1b456d15ec8c}
\strng{authorbibnamehash}{1841abd848ac2f8ced0f1b456d15ec8c}
\strng{authornamehash}{1841abd848ac2f8ced0f1b456d15ec8c}
\strng{authorfullhash}{1841abd848ac2f8ced0f1b456d15ec8c}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{eprintclass}{cs.CR}
\field{journaltitle}{arXiv}
\field{title}{Towards Evaluating the Robustness of Neural Networks}
\field{volume}{1608.04644}
\field{year}{2017}
\true{nocite}
\endentry
\entry{ecma404}{misc}{}
\name{author}{2}{}{%
{{hash=e289d8e4f4648ab33fb5d884998637aa}{%
family={Crockford},
familyi={C\bibinitperiod},
given={Douglas},
giveni={D\bibinitperiod}}}%
{{hash=9dd40e63e249cc624c24d112ca8c5001}{%
family={Morningstar},
familyi={M\bibinitperiod},
given={Chip},
giveni={C\bibinitperiod}}}%
}
\strng{namehash}{de315b7eb28bc313037a1538f8f0ac1b}
\strng{fullhash}{de315b7eb28bc313037a1538f8f0ac1b}
\strng{bibnamehash}{de315b7eb28bc313037a1538f8f0ac1b}
\strng{authorbibnamehash}{de315b7eb28bc313037a1538f8f0ac1b}
\strng{authornamehash}{de315b7eb28bc313037a1538f8f0ac1b}
\strng{authorfullhash}{de315b7eb28bc313037a1538f8f0ac1b}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{12}
\field{title}{Standard ECMA-404 The JSON Data Interchange Syntax}
\field{year}{2017}
\true{nocite}
\verb{doi}
\verb 10.13140/RG.2.2.28181.14560
\endverb
\endentry
\entry{goodfellow2015explaining}{misc}{}
\name{author}{3}{}{%
{{hash=d4f74ef4c79f3bb1e51e378184d8850e}{%
family={Goodfellow},
familyi={G\bibinitperiod},
given={Ian\bibnamedelima J.},
giveni={I\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
{{hash=8f128e70084608a2c29c497ebd794f87}{%
family={Shlens},
familyi={S\bibinitperiod},
given={Jonathon},
giveni={J\bibinitperiod}}}%
{{hash=ed568d9c3bb059e6bf22899fbf170f86}{%
family={Szegedy},
familyi={S\bibinitperiod},
given={Christian},
giveni={C\bibinitperiod}}}%
}
\strng{namehash}{07b2928cf9addb6cf2d09332e9d7ce18}
\strng{fullhash}{07b2928cf9addb6cf2d09332e9d7ce18}
\strng{bibnamehash}{07b2928cf9addb6cf2d09332e9d7ce18}
\strng{authorbibnamehash}{07b2928cf9addb6cf2d09332e9d7ce18}
\strng{authornamehash}{07b2928cf9addb6cf2d09332e9d7ce18}
\strng{authorfullhash}{07b2928cf9addb6cf2d09332e9d7ce18}
\field{sortinit}{G}
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{eprintclass}{stat.ML}
\field{journaltitle}{arXiv}
\field{title}{Explaining and Harnessing Adversarial Examples}
\field{volume}{1412.6572}
\field{year}{2015}
\true{nocite}
\endentry
\entry{ieee3129}{article}{}
\field{sortinit}{I}
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
\field{labeltitlesource}{title}
\field{journaltitle}{IEEE Std 3129-2023}
\field{title}{IEEE Standard for Robustness Testing and Evaluation of Artificial Intelligence (AI)-based Image Recognition Service}
\field{year}{2023}
\true{nocite}
\field{pages}{1\bibrangedash 34}
\range{pages}{34}
\verb{doi}
\verb 10.1109/IEEESTD.2023.10141539
\endverb
\keyw{IEEE Standards;Robustness;Image recording;Testing;Artificial intelligence;Performance evaluation;adversarial attacks;artificial Intelligence-based services;assessment framework;common corruption;IEEE 3129;robustness}
\endentry
\entry{schapire1989strength}{inproceedings}{}
\name{author}{1}{}{%
{{hash=bd36be65806a94f14599091fa7ddc7d3}{%
family={Schapire},
familyi={S\bibinitperiod},
given={R.E.},
giveni={R\bibinitperiod}}}%
}
\strng{namehash}{bd36be65806a94f14599091fa7ddc7d3}
\strng{fullhash}{bd36be65806a94f14599091fa7ddc7d3}
\strng{bibnamehash}{bd36be65806a94f14599091fa7ddc7d3}
\strng{authorbibnamehash}{bd36be65806a94f14599091fa7ddc7d3}
\strng{authornamehash}{bd36be65806a94f14599091fa7ddc7d3}
\strng{authorfullhash}{bd36be65806a94f14599091fa7ddc7d3}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{30th Annual Symposium on Foundations of Computer Science}
\field{title}{The strength of weak learnability}
\field{year}{1989}
\true{nocite}
\field{pages}{28\bibrangedash 33}
\range{pages}{6}
\verb{doi}
\verb 10.1109/SFCS.1989.63451
\endverb
\keyw{Polynomials;Boosting;Laboratories;Computer science;Upper bound;Boolean functions;Filtering}
\endentry
\entry{simonyan2014very}{article}{}
\name{author}{2}{}{%
{{hash=9d16b7284df92c9adaee86c37ab992df}{%
family={Simonyan},
familyi={S\bibinitperiod},
given={Karen},
giveni={K\bibinitperiod}}}%
{{hash=c72fc39e94030f67717052309266a44d}{%
family={Zisserman},
familyi={Z\bibinitperiod},
given={Andrew},
giveni={A\bibinitperiod}}}%
}
\strng{namehash}{25d2f3c4577a6632d37f0126cc781232}
\strng{fullhash}{25d2f3c4577a6632d37f0126cc781232}
\strng{bibnamehash}{25d2f3c4577a6632d37f0126cc781232}
\strng{authorbibnamehash}{25d2f3c4577a6632d37f0126cc781232}
\strng{authornamehash}{25d2f3c4577a6632d37f0126cc781232}
\strng{authorfullhash}{25d2f3c4577a6632d37f0126cc781232}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{arXiv 1409.1556}
\field{month}{09}
\field{title}{Very Deep Convolutional Networks for Large-Scale Image Recognition}
\field{year}{2014}
\true{nocite}
\endentry
\entry{szegedy2014intriguing}{misc}{}
\name{author}{7}{}{%
{{hash=ed568d9c3bb059e6bf22899fbf170f86}{%
family={Szegedy},
familyi={S\bibinitperiod},
given={Christian},
giveni={C\bibinitperiod}}}%
{{hash=e9fec85bbce1b087a6ebefe26e73f7bf}{%
family={Zaremba},
familyi={Z\bibinitperiod},
given={Wojciech},
giveni={W\bibinitperiod}}}%
{{hash=8d569d1d5b8b5a7836017a98b430f959}{%
family={Sutskever},
familyi={S\bibinitperiod},
given={Ilya},
giveni={I\bibinitperiod}}}%
{{hash=c83b564e32475f10dcc91be7e66d3e81}{%
family={Bruna},
familyi={B\bibinitperiod},
given={Joan},
giveni={J\bibinitperiod}}}%
{{hash=8bbc4c5d96f205bada839e74e0202146}{%
family={Erhan},
familyi={E\bibinitperiod},
given={Dumitru},
giveni={D\bibinitperiod}}}%
{{hash=5d2585c11210cf1d4512e6e0a03ec315}{%
family={Goodfellow},
familyi={G\bibinitperiod},
given={Ian},
giveni={I\bibinitperiod}}}%
{{hash=a6784304d1cc890b2cb6c6c7f2f3fd76}{%
family={Fergus},
familyi={F\bibinitperiod},
given={Rob},
giveni={R\bibinitperiod}}}%
}
\strng{namehash}{80f8e6bfc3aff3e75b2807a6f6962740}
\strng{fullhash}{c8c3e9b8f095d055ce92294b35ff475c}
\strng{bibnamehash}{80f8e6bfc3aff3e75b2807a6f6962740}
\strng{authorbibnamehash}{80f8e6bfc3aff3e75b2807a6f6962740}
\strng{authornamehash}{80f8e6bfc3aff3e75b2807a6f6962740}
\strng{authorfullhash}{c8c3e9b8f095d055ce92294b35ff475c}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{eprintclass}{cs.CV}
\field{journaltitle}{arXiv}
\field{title}{Intriguing properties of neural networks}
\field{volume}{1312.6199}
\field{year}{2014}
\true{nocite}
\endentry
\entry{yu2019deep}{misc}{}
\name{author}{4}{}{%
{{hash=7d644ffcde545cbf48ce06126689b74c}{%
family={Yu},
familyi={Y\bibinitperiod},
given={Fisher},
giveni={F\bibinitperiod}}}%
{{hash=e7cf4cb73884dff2f3b4dcbb22c0e27d}{%
family={Wang},
familyi={W\bibinitperiod},
given={Dequan},
giveni={D\bibinitperiod}}}%
{{hash=4ce499f8943cac7cba0a73388d289a2e}{%
family={Shelhamer},
familyi={S\bibinitperiod},
given={Evan},
giveni={E\bibinitperiod}}}%
{{hash=90180e1a30742e0d15328bfe637c2ef4}{%
family={Darrell},
familyi={D\bibinitperiod},
given={Trevor},
giveni={T\bibinitperiod}}}%
}
\strng{namehash}{cc2a6fc8dcf01707f6150fb813b13113}
\strng{fullhash}{1ac77bca64069bcc5cab294171bb674f}
\strng{bibnamehash}{cc2a6fc8dcf01707f6150fb813b13113}
\strng{authorbibnamehash}{cc2a6fc8dcf01707f6150fb813b13113}
\strng{authornamehash}{cc2a6fc8dcf01707f6150fb813b13113}
\strng{authorfullhash}{1ac77bca64069bcc5cab294171bb674f}
\field{sortinit}{Y}
\field{sortinithash}{fd67ad5a9ef0f7456bdd9aab10fe1495}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{eprintclass}{cs.CV}
\field{journaltitle}{arXiv}
\field{title}{Deep Layer Aggregation}
\field{year}{2019}
\true{nocite}
\verb{eprint}
\verb 1707.06484
\endverb
\endentry
\enddatalist
\endrefsection
\endinput