2020 • In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020
Naveed Akhtar and Ajmal Mian. 2018. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6 (2018), 14410-14430.
Shaukat Ali, Muhammad Zohaib Z. Iqbal, Andrea Arcuri, and Lionel C. Briand. 2013. Generating Test Data from OCL Constraints with Search Techniques. IEEE Trans. Software Eng. 39, 10 (2013), 1376-1402. https://doi. org/10. 1109/TSE. 2013. 17
Moustafa Alzantot, Yash Sharma, Supriyo Chakraborty, Huan Zhang, Cho-Jui Hsieh, and Mani B. Srivastava. 2019. GenAttack. Proceedings of the Genetic and Evolutionary Computation Conference (Jul 2019). https://doi. org/10. 1145/3321707. 3321749
Moustafa Alzantot, Yash Sharma, Ahmed Elgohary, Bo-Jhang Ho, Mani Srivastava, and Kai-Wei Chang. 2019. Generating Natural Language Adversarial Examples. Association for Computational Linguistics (ACL), 2890-2896. https://doi. org/10. 18653/v1/d18-1316 arXiv: 1804. 07998
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Šrndic, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion Attacks against Machine Learning at Test Time. Lecture Notes in Computer Science (2013), 387-402. https://doi. org/10. 1007/978-3-642-40994-3_25
Battista Biggio and Fabio Roli. 2018. Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition 84 (December 2018), 317-331. https://doi. org/10. 1016/j. patcog. 2018. 07. 023 arXiv: 1712. 03141
Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. 2017 IEEE Symposium on Security and Privacy (SP) (May 2017). https://doi. org/10. 1109/sp. 2017. 49
Vinícius Veloso de Melo and Wolfgang Banzhaf. 2016. Improving Logistic Regression Classification of Credit Approval with Features Constructed by Kaizen Programming. In Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion-GECCO '16 Companion. ACM Press, Denver, Colorado, USA, 61-62. https://doi. org/10. 1145/2908961. 2908963
K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6, 2 (2002), 182-197.
Kalyanmoy Deb, Karthik Sindhya, and Tatsuya Okabe. 2007. Self-Adaptive Simulated Binary Crossover for Real-Parameter Optimization. In Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation (London, England) (GECCO '07). Association for Computing Machinery, New York, NY, USA, 1187-1194. https://doi. org/10. 1145/1276958. 1277190
Hongwei Feng, Shuang Li, Dianyuan He, and Jun Feng. 2019. A novel feature selection approach based on multiple filters and new separable degree index for credit scoring. In Proceedings of the ACM Turing Celebration Conference-China on-ACM TURC '19. ACM Press, Chengdu, China, 1-5. https://doi. org/10. 1145/3321408. 3323928
B. J. Garvin, M. B. Cohen, and M. B. Dwyer. 2009. An Improved Meta-heuristic Search for Constrained Interaction Testing. In 2009 1st International Symposium on Search Based Software Engineering. 13-22.
Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick McDaniel. 2017. Adversarial examples for malware detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10493 LNCS. Springer Verlag, 62-79. https://doi. org/10. 1007/978-3-319-66399-9_4
Alex Kantchelian, J. D. Tygar, and Anthony D. Joseph. 2016. Evasion and Hardening of Tree Ensemble Classifiers. In Proceedings of the 33rd International Conference on International Conference on Machine Learning-Volume 48 (New York, NY, USA) (ICML'16). JMLR. org, 2387-2396.
Francisco Louzada, Anderson Ara, and Guilherme B. Fernandes. 2016. Classification methods applied to credit scoring: Systematic review and overall comparison. Surveys in Operations Research and Management Science 21, 2 (Dec. 2016), 117-134. https://doi. org/10. 1016/j. sorms. 2016. 10. 001
Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards Deep Learning Models Resistant to Adversarial Attacks., 27 pages. arXiv: 1706. 06083 http://arxiv. org/abs/1706. 06083
Phil McMinn. 2004. Search-based software test data generation: a survey. Softw. Test. Verification Reliab. 14, 2 (2004), 105-156. https://doi. org/10. 1002/stvr. 294
Zbigniew Michalewicz and Marc Schoenauer. 1996. Evolutionary Algorithms for Constrained Parameter Optimization Problems. Evol. Comput. 4, 1 (1996), 1-32. https://doi. org/10. 1162/evco. 1996. 4. 1. 1
Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Beat Buesser, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Ian Molloy, and Ben Edwards. 2018. Adversarial Robustness Toolbox v1. 2. 0. CoRR 1807. 01069 (2018). https://arxiv. org/pdf/1807. 01069
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 372-387.
Nicolas Papernot, Patrick D. McDaniel, and Ian J. Goodfellow. 2016. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. CoRR abs/1605. 07277 (2016). arXiv: 1605. 07277 http://arxiv. org/abs/1605. 07277
Cynthia Rudin. 2019. Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nature Machine Intelligence 1, 5 (May 2019), 206-215. https://doi. org/10. 1038/s42256-019-0048-x
Roberto Saia, Salvatore Carta, and Gianni Fenu. 2018. A Wavelet-based Data Analysis to Credit Scoring. In Proceedings of the 2nd International Conference on Digital Signal Processing-ICDSP 2018. ACM Press, Tokyo, Japan, 176-180. https://doi. org/10. 1145/3193025. 3193039
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv: 1312. 6199 (2013).
Lyn C. Thomas, David B. Edelman, and Jonathan N. Crook. 2002. Credit Scoring and Its Applications. Society for Industrial and Applied Mathematics. https://doi. org/10. 1137/1. 9780898718317
Shayan Zamani and Hadi Hemmati. 2019. Revisiting Hyper-Parameter Tuning for Search-Based Test Data Generation. Lecture Notes in Computer Science (2019), 137-152. https://doi. org/10. 1007/978-3-030-27455-9_10