Complexity Explorer Santa Few Institute

Lecture: Artificial Intelligence

Lead instructor:

Your progress is not being saved! Enroll now or log in to track your progress or submit homework.

2.1 Lecture I. » Source: Literature cited

Alcorn, Michael A., et al. "Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects." arXiv:1811.11553 ().

Eykholt, Kevin, et al. "Robust physical-world attacks on deep learning models." arXiv:1707.08945 (2017).

Kansky, Ken, et al. "Schema networks: Zero-shot transfer with a generative causal model of intuitive physics." arXiv:1706.04317 ().

Levesque, Hector, Ernest Davis, and Leora Morgenstern. "The winograd schema challenge." Thirteenth International Conference on the Principles of Knowledge Representation and Reasoning. 2012.

McCarthy, John, et al. "A proposal for the dartmouth summer research project on artificial intelligence, august 31, 1955." AI magazine 27.4 (2006): 12-12.

Mnih, Volodymyr, et al. "Human-level control through deep reinforcement learning." Nature 518.7540 (2015): 529-533.

Sharif, Mahmood, et al. "Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition." Proceedings of the 2016 acm sigsac conference on computer and communications security. 2016.

Szegedy, Christian, et al. "Intriguing properties of neural networks." arXiv:1312.6199 (2013).