TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. ,
Turning your weakness into a strength: Watermarking deep neural networks by backdooring, 27th {USENIX} Security Symposium ({USENIX} Security 18), pp.1615-1631, 2018. ,
, Some insights into the geometry and training of neural networks, 2016.
Color correct digital watermarking of images, United States Patent, vol.5530759, 1996. ,
Audio adversarial examples: Targeted attacks on speech-to-text, 2018. ,
A neural-network-based robust watermarking scheme, 2005. ,
, , 2015.
An empirical evaluation of adversarial robustness under transfer learning, ICML Workshop on Understanding and Improving General-ization in Deep Learning, 2019. ,
Stealing neural networks via timing side channels, 2018. ,
Stealing neural networks via timing side channels, 2018. ,
Explaining and harnessing adversarial examples, 2015. ,
On the (statistical) detection of adversarial examples, 2017. ,
Watermarking deep neural networks for embedded systems, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.1-8, 2018. ,
Multimedia watermarking techniques, Proceedings of the IEEE, vol.87, issue.7, pp.1079-1107, 1999. ,
A simple way to initialize recurrent networks of rectified linear units, 2015. ,
Adversarial frontier stitching for remote neural network watermarking, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02043818
Tampernn: Efficient tampering detection of deployed neural nets, 2019. ,
The mnist database of handwritten digits, 1998. ,
Adversarial perturbations against real-time video classification systems, 2018. ,
, Trojaning attack on neural networks. In: NDSS, 2017.
Universal adversarial perturbations, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01992067
Digital watermarking for deep neural networks, International Journal of Multimedia Information Retrieval, vol.7, issue.1, pp.3-16, 2018. ,
Towards reverseengineering black-box neural networks, International Conference on Learning Representations, 2018. ,
, cleverhans v2.0.0: an adversarial machine learning library, 2017.
Practical black-box attacks against machine learning, ASIA CCS, 2017. ,
, The Limitations of Deep Learning in Adversarial Settings, 2015.
, The limitations of deep learning in adversarial settings, 2015.
Deepsigns: A generic watermarking framework for IP protection of deep learning models, 2018. ,
, Are accuracy and robustness correlated? In: ICMLA, 2016.
Data driven exploratory attacks on black box classifiers in adversarial domains, Neurocomputing, vol.289, pp.129-143, 2018. ,
Are adversarial examples inevitable?, 2018. ,
Deep convolutional neural networks for computer-aided detection: Cnn architectures, dataset characteristics and transfer learning, IEEE Transactions on Medical Imaging, vol.35, issue.5, pp.1285-1298, 2016. ,
Stealing machine learning models via prediction apis, USENIX Security Symposium, 2016. ,
, Ensemble adversarial training: Attacks and defenses, 2017.
Embedding watermarks into deep neural networks, p.ICMR, 2017. ,
A digital watermark, Proceedings of 1st International Conference on Image Processing, vol.2, pp.86-90, 1994. ,
Stealing hyperparameters in machine learning, 2018. ,
Adversarial examples: Attacks and defenses for deep learning, IEEE Transactions on Neural Networks and Learning Systems, pp.1-20, 2019. ,
Protecting intellectual property of deep neural networks with watermarking, Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp.159-172, 2018. ,
Towards graph watermarks, 2015. ,