National Academies Press: OpenBook
« Previous: 9 Machine Learning Systems
Suggested Citation:"References." National Academies of Sciences, Engineering, and Medicine. 2019. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25534.
×

References

Bartsch, M.V., K. Loewe, C. Merkel, H.-J. Heinze, M.A. Schoenfeld, J.K. Tsotsos, and J.M. Hopf. 2017. Attention to color sharpens neural population tuning via feedback processing in the human visual cortex hierarchy. Journal of Neuroscience 37(43):10346-10357.

Bendale, A., and T.E. Boult. 2016. “Towards Open-Set Deep Networks.” Pp. 1563-1572 in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). https://www.cvfoundation.org/openaccess/CVPR2016.py.

Boehler, C.N., J.K. Tsotsos, M. Schoenfeld, H.-J. Heinze, and J.-M. Hopf. 2009. The center-surround profile of the focus of attention arises from recurrent processing in visual cortex. Cerebral Cortex 19:982-991.

Conotter, V., J. O’Brien, and H. Farid. 2012. Exposing digital forgeries in ballistic motion. IEEE Transactions on Information Forensics and Security 7(1):283-296.

Cutzu, F., and J.K. Tsotsos. 2003. The selective tuning model of visual attention: Testing the predictions arising from the inhibitory surround mechanism. Vision Research 205-219.

Fawzi, A., H. Fawzi, and O. Fawzi. 2018. “Adversarial Vulnerability for Any Classifier.” https://arxiv.org/abs/1802.08686.

Fukushima, K. 1975. Cognitron: A self-organizing multilayered neural network. Biological Cybernetics 20(3-4):121-136.

Gibson, J.J. 1950. The Perception of the Visual World. Boston, MA: Houghton Mifflin.

Hopf, J.-M., C.N. Boehler, S.J. Luck, J.K. Tsotsos, H.-J. Heinze, and M.A. Schoenfeld. 2006. Direct neurophysiological evidence for spatial suppression surrounding the focus of attention in vision. Proceedings of the National Academy of Sciences 103(4):1053-1058.

Julesz, B. 1971. Foundations of Cyclopean Perception. Chicago, IL: University of Chicago Press.

Krizhevsky, A., I. Sutskever, and G.E. Hinton. 2017. ImageNet classification with deep convolutional networks. Communications of the ACM 60(6): 84-90.

Lamb, A., J. Binas, A. Goyal, D. Serdyuk, S. Subramanian, I. Mitliagkas, and Y. Bengio. 2018. “Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations.” arXiv preprint arXiv:1804.02485.

Suggested Citation:"References." National Academies of Sciences, Engineering, and Medicine. 2019. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25534.
×

Liew, S.S., M. Khalik-Hani, and R. Bakkteri. 2016. Bounded activation functions for enhanced training stability of deep neural networks on visual pattern recognition problems. Neurocomputing 216:718-734.

Marr, D., and T. Poggio. 1979. A theory of human stereo vision. Proceedings of the Royal Society of London B 204:301-328.

Matthew, R.P., S. Seko, J. Bailey, R. Bajcsy, and J. Lotz. 2018. “Tracking Kinematic and Kinetic Measures of Sit-to-Stand Using an Instrumented Spine Orthosis.” Pp. 1-5 in 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). https://ieeexplore.ieee.org/xpl/conhome/8471725/proceeding.

Meng, D., and H. Chen. 2017. “Magnet: A Two-Pronged Defense Against Adversarial Examples.” https://arxiv.org/abs/1705.09064.

Mitchell, T.M. 1997. Does machine learning really work? AI Magazine 18(3):11-20.

Moran, J., and R. Desimone. 1985. Selective attention gates visual processing in the extrastriate cortex. Science 229:782-784.

NRC (National Research Council). 2015. Robust Methods for the Analysis of Images and Videos for Fisheries Stock Assessment: Summary of a Workshop. Washington, DC: The National Academies Press.

Phillips, P.J., A.N. Yates, Y. Hu, C.A. Hahn, E. Noyesm K. Jackson, J.G. Cavazoa, et al. 2018. Face recognition accuracy of forensic examiners, superrecognizers and face recognition algorithms. Proceedings of the National Academy of Sciences 115(24):6171-6176.

Potter, M.C. 1975. Meaning in visual search. Science 187(4180):965-966.

Roberts, L.G. 1963. “Machine Perception of Three-Dimensional Solids.” Doctoral dissertation. Cambridge, MA: Massachusetts Institute of Technology.

Rosenfeld, A., and M. Thurston. 1971. Edge and curve detection for visual scene analysis. IEEE Transactions on Computers (5):562-569.

Rudd, E., L.P. Jain, W.J. Scheirer, and T.E. Boult. 2018. The Extreme Value Machine. IEEE Transactions on Pattern Analysis and Machine Intelligence 40(3):762-768.

Scheirer, W.J., A. Rocha, A. Sapkota, and T.E. Boult. 2013. Toward open-set recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 35(7):1757-1772.

Thorpe, S., D. Fize, and C. Marlot. 1996. Speed of processing in the human visual system. Nature 381(6582):520-522.

Tsotsos, J.K. 1987. “A ‘Complexity Level’ analysis of vision.” Pp. 346-355 in Proceedings of the 1st International Conference on Computer Vision (M. Brady and A. Rosenfeld, eds.). Washington DC: IEEE Computer Society Press.

Tsotsos, J., I. Kotseruba, and C. Wloka. 2016. A focus on selection for fixation. Journal of Eye Movement Research 9(5).

Tsotsos, J.K., A. Rodriguez-Sanchez, A. Rothenstein, and E. Simine. 2008. Different binding strategies for the different stages of visual recognition. Brain Research 1225:119-132.

Uhr, L. 1972. Layered “recognition cone” networks that preprocess, classify and describe. IEEE Transactions on Computers C-21(7):758-768.

Valiant, L. 1984. A theory of the learnable. Communications of the ACM 27(11):1134-1142.

von der Malsburg, C. 1981. The Correlation Theory of Brain Function. Internal Report 81-82. Göttingen, Germany: Department of Neurobiology, MaxPlanck Institute for Biophysical Chemistry.

Xiao, C., R. Deng, B. Li, F. Yu, M. Liu, and D.X. Song. 2018. “Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.” https://arxiv.org/abs/1810.05162.

Suggested Citation:"References." National Academies of Sciences, Engineering, and Medicine. 2019. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25534.
×
Page 53
Suggested Citation:"References." National Academies of Sciences, Engineering, and Medicine. 2019. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25534.
×
Page 54
Next: Appendixes »
Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop Get This Book
×
 Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The Intelligence Community Studies Board (ICSB) of the National Academies of Sciences, Engineering, and Medicine convened a workshop on December 11–12, 2018, in Berkeley, California, to discuss robust machine learning algorithms and systems for the detection and mitigation of adversarial attacks and anomalies. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!