,
Wild patterns: Ten years after the rise of adversarial machine learning, Pattern Recognition, vol.84, pp.317-331, 2018. ,
Program checking, Foundations of Software Technology and Theoretical Computer Science, pp.1-9, 1991. ,
Vggface2: A dataset for recognising faces across pose and age, FG, 2018. ,
Principles of remote attestation, International Journal of Information Security, vol.10, issue.2, pp.63-81, 2011. ,
Watermarking, tamper-proofing, and obfuscation -tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002. ,
Explaining and harnessing adversarial examples, ICLR, 2015. ,
Deep residual learning for image recognition, 2015. ,
Have you stolen my model? evasion attacks against deep neural network watermarking techniques, 2018. ,
Mobilenets: Efficient convolutional neural networks for mobile vision applications, 2017. ,
Densely connected convolutional networks, CVPR, 2017. ,
A self-driving robot using deep convolutional neural networks on neuromorphic hardware, 2017. ,
Adversarial examples in the physical world, 2017. ,
Deepx: A software accelerator for low-power deep learning inference on mobile devices, IPSN, 2016. ,
Adversarial frontier stitching for remote neural network watermarking, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02043818
Machine learning models that remember too much, CCS, 2017. ,
Decision boundary feature extraction for neural networks, IEEE Transactions on Neural Networks, vol.8, issue.1, pp.75-83, 1997. ,
, Trojaning attack on neural networks. In NDSS, 2018.
Magnet: A two-pronged defense against adversarial examples, CCS, 2017. ,
, Digital watermarking for deep neural networks. IJMIR, vol.7, pp.3-16, 2018.
Practical black-box attacks against machine learning, ASIA CCS, 2017. ,
Distillation as a defense to adversarial perturbations against deep neural networks, In S&P, 2016. ,
Towards the science of security and privacy in machine learning, CoRR, 2016. ,
Deep face recognition, BMVC, 2015. ,
Deepxplore: Automated whitebox testing of deep learning systems, SOSP, 2017. ,
Toward an intrusion detection approach for iot based on radio communications profiling, EDCC, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01561710
Membership inference attacks against machine learning models, S&P, 2017. ,
Very deep convolutional networks for large-scale image recognition, 2014. ,
Intriguing properties of neural networks, In ICLR, 2013. ,
Stealing machine learning models via prediction apis, USENIX Security, 2016. ,
Reverse engineering state machines by interactive grammar inference, 14th Working Conference on Reverse Engineering, pp.209-218, 2007. ,
Squeezedet: Unified, small, low power fully convolutional neural networks for real-time object detection for autonomous driving, IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017. ,
Feature squeezing: Detecting adversarial examples in deep neural networks, NDSS, 2018. ,