Open Access
Issue |
E3S Web Conf.
Volume 430, 2023
15th International Conference on Materials Processing and Characterization (ICMPC 2023)
|
|
---|---|---|
Article Number | 01082 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/e3sconf/202343001082 | |
Published online | 06 October 2023 |
- Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. Evasion attacks against machine learning at test time. In 10 Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013 [Google Scholar]
- Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks, 2013. [Google Scholar]
- Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples, 2014. [Google Scholar]
- Alexey Kurakin, Ian Goodfellow, and Samy Bengio. Adversarial examples in the physical world. In ICLR’2017 Workshop, 2016. [Google Scholar]
- Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks, 2017. [Google Scholar]
- Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. The limitations of deep learning in adversarial settings, 2015. [Google Scholar]
- Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. Delving into transferable adversarial examples and black-box attacks, 2016. [Google Scholar]
- James M Hillis, Marc O Ernst, Martin S Banks, and Michael S Landy. Combining sensory information: mandatory fusion within, but not between, senses. Science, 2002. [Google Scholar]
- Demis Hassabis, Dharshan Kumaran, Christopher Summerfield, and Matthew Botvinick. Neuroscience-inspired artificial intelligence. Neuron, 2017. [Google Scholar]
- Jacob Buckman, Aurko Roy, Colin Raffel, and Ian Goodfellow. Thermometer encoding: One hot way to resist adversarial examples. International Conference on Learning Representations, 2018. [Google Scholar]
- J Zico Kolter and Eric Wong. Provable defenses against adversarial examples via the convex outer adversarial polytope, 2017. [Google Scholar]
- Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. Distillation as a defense to adversarial perturbations against deep neural networks, 2016. [Google Scholar]
- F. Tramèr, A. Kurakin, N. Papernot, D. Boneh, and P. McDaniel. Ensemble Adversarial Training: Attacks and Defenses, May 2017. [Google Scholar]
- Weilin Xu, David Evans, and Yanjun Qi. Feature squeezing: Detecting adversarial examples in deep neural networks, 2017. [Google Scholar]
- S. E. Kahou, C. Pal, X. Bouthillier, P. Froumenty, ¸C. Gul¸cehre, R. Memisevic, P. Vincent, A. Courville, ¨ Y. Bengio, R. C. Ferrari, et al. Combining modality specific deep neural networks for emotion recognition in video. In Proceedings of the 15th ACM on International conference on multimodal interaction, 2013. [Google Scholar]
- A. Kittur, E. H. Chi, and B. Suh. Crowdsourcing user studies with mechanical turk. In M. Czerwinski, A. M. Lund, and D. S. Tan, editors, Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008. [Google Scholar]
- A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, 2012. [Google Scholar]
- M. Liu, S. Li, S. Shan, R. Wang, and X. Chen. Deeply learning deformable facial action parts model for dynamic expression analysis. In Computer Vision–ACCV 2014, 2014. [Google Scholar]
- V. Ojansivu and J. Heikkilä. Blur insensitive texture classification using local phase quantization. In Image and signal processing, 2008. [Google Scholar]
- R. Rosenthal. Conducting judgment studies: Some methodological issues. The new handbook of methods in nonverbal behavior research, 2005. [Google Scholar]
- Johann Christoph Fregtag, The Basic Principles of Query Optimization in Relational Database Management System, European Computer Industry Research Centre Germany, 1989. [Google Scholar]
- Jyoti Mor, Indu Kashyap, R.K. Rathy Analysis of query optimization techniques in databases Int. J. Comp. Appl., 47 (15) (2012). [Google Scholar]
- Marian V, Iordache and Panos J. Antsaklis, “Supervisory Control of Concurrent Systems, Chapter 2, A Petri Net Structural Approach”, Birkhauser Boston. [Google Scholar]
- E. Vinek, P.P. Beran, E. Schikuta, wwwwwfMapping Distributed Heterogeneous Systems to a Common Language by Applying Ontologies, in: PDCN 2011: Proceedings of the 10th IASTED International Conference on Parallel and Distributed Computing and Networks, 2011. [Google Scholar]
- A. Kemper, G. Moerkotte Query optimization in object bases: Exploiting relational techniques J.-C. Freytag, D. Maier, G. Vossen (Eds.), Query Optimization in Next Generation Database Systems, Morgan Kaufmann (1993). [Google Scholar]
- Peter Bajcsy, Joe Chalfoun, Mylene Simon, Marcin Kociolek & Mary Brady (2021), Object measurements from 2D microscopy images. [Google Scholar]
- Santi Kumari Behera, Shrabani Sangita, Prabira Kumar Sethy & Amiya Kumar Rath (2018), Image Processing Based Detection & Size Estimation of Fruit on Mango Tree Canopies, Number 4 [Google Scholar]
- Xin Li, Huijie Li, Youyou Lu, Yanchao Zhao, Xiaolin Qin, “Replica-aware data recovery performance improvement for Hadoop system with NVM“, CCF Transactions on High Performance Computin, 2021. [Google Scholar]
- Yunhong Ji, Yunpeng Chai, Xuan Zhou, Lipeng Ren, Yajie Qin, “Smart Intra-query 46 Fault Tolerance for Massive Parallel Processing Databases“, Data Science and Engineering, 2020. [Google Scholar]
- Abdallah Salama, Carsten Binnig, Tim Kraska, Erfan Zamanian, “Cost-based Fault-tolerance for Parallel Data Processing”, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015. [Google Scholar]
- Prasanna Lakshmi, K., Reddy, C.R.K. A survey on different trends in Data Streams (2010) ICNIT 2010 - 2010 International Conference on Networking and Information Technology, art. no. 5508473, pp. 451-455. [Google Scholar]
- Jeevan Nagendra Kumar, Y., Spandana, V., Vaishnavi, V.S., Neha, K., Devi, V.G.R.R. Supervised machine learning Approach for crop yield prediction in agriculture sector (2020) Proceedings of the 5th International Conference on Communication and Electronics Systems, ICCES 2020, art. no. 09137868, pp. 736-741. [Google Scholar]
- Sankara Babu, B., Suneetha, A., Charles Babu, G., Jeevan Nagendra Kumar, Y., Karuna, G. Medical disease prediction using grey wolf optimization and auto encoder based recurrent neural network (2018) Periodicals of Engineering and Natural Sciences, 6 (1), pp. 229-240. [CrossRef] [Google Scholar]
- Nagaraja, A., Boregowda, U., Khatatneh, K., Vangipuram, R., Nuvvusetty, R., Sravan Kiran, V. Similarity Based Feature Transformation for Network Anomaly Detection (2020) IEEE Access, 8, art. no. 9006824, pp. 39184-39196 [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.