-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathbibliography.tex
More file actions
64 lines (43 loc) · 1.71 KB
/
bibliography.tex
File metadata and controls
64 lines (43 loc) · 1.71 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
\bibitem{lamport94}
Neha Soni, Enakshi Khula Sharma, Narotam Singh, Amita Kapoor.
Impact of Artificial Intelligence on Businesses: from Research, Innovation, Market
Deployment to Future Shifts in Business Models
\bibitem{lamport94}
Sharif, Bhagavatula, Bauer, Reiter
Accessorize to a Crime: Real and Stealthy Attacks on
State-of-the-Art Face Recognition
\bibitem{lamport94}
Hardy,
https://www.nytimes.com/2016/07/19/technology/reasons-to-believe-the-ai-boom-is-real.html
\bibitem{lamport94}
Krizhevsky, Sutskeve, Hinton,
ImageNet Classification with Deep Convolutional
Neural Networks
\bibitem{lamport94}
Awad
Machine Learning Techniques for Fingerprint
Identification: A Short Review
\bibitem{lamport94}
Parkhi, Vedaldi, Zisserman
Deep Face Recognition
\bibitem{lamport94}
N. Kumar, A. C. Berg, P. N. Belhumeur, and S. K.
Nayar. Attribute and simile classifiers for face
verification. In Proc. ICCV, 2009
\bibitem{lamport94}
Goodfellow, Shlens, Szegedy,
Explaining and Harnessing Adversarial Examples
\bibitem{lamport94}
Szegedy et al.
Intriguing properties of neural networks
\bibitem{lamport94}
Megvii Inc. Face++. http://www.faceplusplus.com/.
\bibitem{lamport94}
Convolution Operation on Volume, Multiple Filters, Stride, Padding, Pooling, LeNet 5 \url{https://indoml.com/2018/03/07/student-notes-convolutional-neural-networks-cnn-introduction/}
\bibitem{lamport94}
Szegedy et al.
K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In International Conference on Learning Representations, 2015.
\bibitem{lamport94}
M. Fredrikson, S. Jha, and T. Ristenpart. Model
inversion attacks that exploit confidence information
and basic countermeasures. In Proc. ACM CCS, 2015.