2.1 Lecture I. » Source: Literature cited
Alcorn, Michael A., et al. "Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects." arXiv:1811.11553 ().
Eykholt, Kevin, et al. "Robust physical-world attacks on deep learning models." arXiv:1707.08945 (2017).
Kansky, Ken, et al. "Schema networks: Zero-shot transfer with a generative causal model of intuitive physics." arXiv:1706.04317 ().
Levesque, Hector, Ernest Davis, and Leora Morgenstern. "The winograd schema challenge." Thirteenth International Conference on the Principles of Knowledge Representation and Reasoning. 2012.
McCarthy, John, et al. "A proposal for the dartmouth summer research project on artificial intelligence, august 31, 1955." AI magazine 27.4 (2006): 12-12.
Mnih, Volodymyr, et al. "Human-level control through deep reinforcement learning." Nature 518.7540 (2015): 529-533.
Sharif, Mahmood, et al. "Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition." Proceedings of the 2016 acm sigsac conference on computer and communications security. 2016.
Szegedy, Christian, et al. "Intriguing properties of neural networks." arXiv:1312.6199 (2013).