Aktionen

Benutzer

C.heck: Unterschied zwischen den Versionen

Aus exmediawiki

Zeile 5: Zeile 5:
 
* https://bdtechtalks.com/2018/12/27/deep-learning-adversarial-attacks-ai-malware/
 
* https://bdtechtalks.com/2018/12/27/deep-learning-adversarial-attacks-ai-malware/
  
===Psychoacoustic Hiding===
+
===Psychoacoustic Hiding (Attacking Speech Recognition)===
 
* https://adversarial-attacks.net/
 
* https://adversarial-attacks.net/
 
** Code: https://github.com/rub-ksv/adversarialattacks
 
** Code: https://github.com/rub-ksv/adversarialattacks
 
** Paper: https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_08-2_Schonherr_paper.pdf
 
** Paper: https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_08-2_Schonherr_paper.pdf
 
** Präsentationsfolien: https://www.ndss-symposium.org/wp-content/uploads/ndss2019_08-2_Schonherr_slides.pdf
 
** Präsentationsfolien: https://www.ndss-symposium.org/wp-content/uploads/ndss2019_08-2_Schonherr_slides.pdf
 +
 
===paraphrasing attacks===
 
===paraphrasing attacks===
 
* https://venturebeat.com/2019/04/01/text-based-ai-models-are-vulnerable-to-paraphrasing-attacks-researchers-find/
 
* https://venturebeat.com/2019/04/01/text-based-ai-models-are-vulnerable-to-paraphrasing-attacks-researchers-find/

Version vom 12. April 2019, 12:22 Uhr

Links

adversarial attacks

Psychoacoustic Hiding (Attacking Speech Recognition)

paraphrasing attacks

Tesla

HowTo's

libraries

XAI

ethics

esotheric neural net

KI-generierte Sprache

(KI-generierte) Krypto

Reproduktive KI

https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/

last semester

Datei:Neuronales-netz am eigenen-bild.ipynb