Aktionen

Benutzer

C.heck: Unterschied zwischen den Versionen

Aus exmediawiki

Zeile 21: Zeile 21:
 
===HowTo's===
 
===HowTo's===
 
* https://towardsdatascience.com/know-your-enemy-7f7c5038bdf3
 
* https://towardsdatascience.com/know-your-enemy-7f7c5038bdf3
 +
** Jupyter Notebook: https://github.com/oscarknagg/adversarial/blob/master/notebooks/Creating_And_Defending_From_Adversarial_Examples.ipynb
 
* https://cv-tricks.com/how-to/breaking-deep-learning-with-adversarial-examples-using-tensorflow/
 
* https://cv-tricks.com/how-to/breaking-deep-learning-with-adversarial-examples-using-tensorflow/
 
* https://medium.com/@ml.at.berkeley/tricking-neural-networks-create-your-own-adversarial-examples-a61eb7620fd8
 
* https://medium.com/@ml.at.berkeley/tricking-neural-networks-create-your-own-adversarial-examples-a61eb7620fd8
 +
** Jupyter Notebook: https://github.com/dangeng/Simple_Adversarial_Examples
 +
 
===libraries===
 
===libraries===
 
* https://github.com/bethgelab
 
* https://github.com/bethgelab

Version vom 12. April 2019, 12:51 Uhr

Links

adversarial attacks

Psychoacoustic Hiding (Attacking Speech Recognition)

paraphrasing attacks

Tesla

HowTo's

libraries

XAI

ethics

esotheric neural net

KI-generierte Sprache

(KI-generierte) Krypto

Reproduktive KI

https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/

last semester

Datei:Neuronales-netz am eigenen-bild.ipynb