2021. Retrieved August 25, 2020 from https://paperswithcode. com/sota/semisupervised-image-classification-on-cifar-2
Alex Krizhevsky and Vinod Nair and Geoffrey Hinton. 2009. The CIFAR-10 dataset. Retrieved August 25, 2020 from https://www. cs. Toronto. edu/~kriz/cifar. html
Shai Ben-David, Tyler Lu, and Dávid Pál. 2008. Does Unlabeled Data Provably Help? Worst-case Analysis of the Sample Complexity of Semi-Supervised Learning. In COLT. 33-44.
Battista Biggio, Luca Didaci, Giorgio Fumera, and Fabio Roli. 2013. Poisoning attacks to compromise face templates. In International Conference on Biometrics, ICB 2013, 4-7 June, 2013, Madrid, Spain, Julian Fiérrez, Ajay Kumar, Mayank Vatsa, Raymond N. J. Veldhuis, and Javier Ortega-Garcia (Eds.). IEEE, 1-7. https://doi. org/10. 1109/ICB. 2013. 6613006
Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning Attacks against Support Vector Machines. arXiv: 1206. 6389 [cs. LG]
Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM. Retrieved August 25, 2020 from https://www. csie. ntu. edu. Tw/~cjlin/libsvmtools/datasets
Maxime Cordy, Steve Muller, Mike Papadakis, and Yves Le Traon. 2019. Searchbased test and improvement of machine-learning-based anomaly detection systems. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Beijing, China, July 15-19, 2019, Dongmei Zhang and Anders Møller (Eds.). ACM, 158-168. https://doi. org/10. 1145/3293882. 3330580
Rob Fergus, YairWeiss, and Antonio Torralba. 2009. Semi-Supervised Learning in Gigantic Image Collections. In Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta (Eds.). Curran Associates, Inc., 522-530. http://papers. nips. cc/paper/3633-semisupervised-learning-in-gigantic-image-collections. pdf
T. Gu, K. Liu, B. Dolan-Gavitt, and S. Garg. 2019. BadNets: Evaluating Backdooring Attacks on Deep Neural Networks. IEEE Access 7 (2019), 47230-47244.
Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, and Ondrej Chum. 2019. Label Propagation for Deep Semi-Supervised Learning. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, June 16-20, 2019. Computer Vision Foundation/IEEE, 5070-5079. https://doi. org/10. 1109/CVPR. 2019. 00521
Jane Wakefield. 2016. Microsoft chatbot is taught to swear on Twitter. Retrieved August 25, 2020 from https://www. bbc. com/news/technology-35890188
Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, and Blaine Nelson. 2013. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos 3, 1 (2013), 1-30. https://doi. org/10. 4230/DagMan. 3. 1. 1
Matti Kääriäinen. 2005. Generalization error bounds using unlabeled data. In International Conference on Computational Learning Theory. Springer, 127-142.
Yann LeCun, Léon Bottou, Yoshua Bengio, Patrick Haffner, et al. 1998. Gradientbased learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278-2324.
David D. Lewis, Yiming Yang, Tony G. Rose, and Fan Li. 2004. RCV1: A New Benchmark Collection for Text Categorization Research. J. Mach. Learn. Res. 5 (2004), 361-397. http://jmlr. org/papers/volume5/lewis04a/lewis04a. pdf
Yu-Feng Li and De-Ming Liang. 2019. Safe semi-supervised learning: a brief introduction. Frontiers Comput. Sci. 13, 4 (2019), 669-676. https://doi. org/10. 1007/s11704-019-8452-2
Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, and Cho-Jui Hsieh. 2019. A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv: 1910. 14147 (2019).
Shike Mei and Xiaojin Zhu. 2015. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, USA, Blai Bonet and Sven Koenig (Eds.). AAAI Press, 2871-2877. http://www. aaai. org/ocs/index. php/AAAI/AAAI15/paper/view/9472
Andrea Paudice, Luis Muñoz-González, and Emil C. Lupu. 2018. Label Sanitization Against Label Flipping Poisoning Attacks. In ECML PKDD 2018 Workshops-Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings (Lecture Notes in Computer Science, Vol. 11329), Carlos Alzate, Anna Monreale, Haytham Assem, Albert Bifet, Teodora Sandra Buda, Bora Caglayan, Brett Drury, Eva García-Martín, Ricard Gavaldà, Stefan Kramer, Niklas Lavesson, Michael Madden, Ian Molloy, Maria-Irina Nicolae, and Mathieu Sinn (Eds.). Springer, 5-15. https://doi. org/10. 1007/978-3-030-13453-2_1
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825-2830.
Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, and Monirul I. Sharif. 2006. Misleading Worm Signature Generators Using Deliberate Noise Injection. In 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA. IEEE Computer Society, 17-31. https://doi. org/10. 1109/SP. 2006. 26
Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, and George Loukas. 2019. A taxonomy and survey of attacks against machine learning. Computer Science Review 34 (2019), 100199.
Bernhard Schölkopf, Alex J. Smola, Robert C. Williamson, and Peter L. Bartlett. 2000. New Support Vector Algorithms. Neural Computation 12, 5 (2000), 1207-1245. https://doi. org/10. 1162/089976600300015565
Matthias Seeger. 2000. Learning with Labeled and Unlabeled Data. (2000). http://infoscience. epfl. ch/record/161327
Michael Speriosu, Nikita Sudan, Sid Upadhyay, and Jason Baldridge. 2011. Twitter Polarity Classification with Label Propagation over Lexical Links and the Follower Graph. In Proceedings of the First workshop on Unsupervised Learning in NLP. Association for Computational Linguistics, Edinburgh, Scotland, 53-63. https://www. aclweb. org/anthology/W11-2207
Gang Wang, Tianyi Wang, Haitao Zhang, and Ben Y. Zhao. 2014. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. In Proceedings of the 23rd USENIX Conference on Security Symposium (San Diego, CA) (SEC'14). USENIX Association, USA, 239-254.
Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, and Fabio Roli. 2015. Support vector machines under adversarial label contamination. Neurocomputing 160 (2015), 53-62. https://doi. org/10. 1016/j. neucom. 2014. 08. 081
Jie M. Zhang, Mark Harman, Lei Ma, and Yang Liu. 2019. Machine Learning Testing: Survey, Landscapes and Horizons. CoRR abs/1906. 10742 (2019). arXiv: 1906. 10742 http://arxiv. org/abs/1906. 10742
Ping Zhang, Fei Wang, Jianying Hu, and Robert Sorrentino. 2015. Label Propagation Prediction of Drug-Drug Interactions Based on Clinical Side Effects. Scientific Reports 5 (2015).
Dengyong Zhou, Olivier Bousquet, Thomas N Lal, Jason Weston, and Bernhard Schölkopf. 2004. Learning with local and global consistency. In Advances in neural information processing systems. 321-328.
Xiaojin Zhu. 2005. Semi-Supervised Learning Literature Survey. Technical Report 1530. Computer Sciences, University of Wisconsin-Madison.
Xiaojin Zhu and Youbin Ghahramani. 2002. Learning from labeled and unlabeled data with Label propagation. (2002).
Xiaojin Zhu, Zoubin Ghahramani, and John Lafferty. 2003. Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions. ICML-03, 20th International Conference on Machine Learning 3, 912-919.