Browse Source

Update HW10

main
Fafa-DL 2 years ago
parent
commit
e454f7a78a
4 changed files with 989 additions and 1 deletions
  1. BIN
      2022 ML/10 Attack/Attacks-in-NLP-Draft.pdf
  2. +987
    -0
      2022 ML/10 Attack/ML2022_hw10.ipynb
  3. BIN
      2022 ML/10 Attack/Machine Learning HW10 Adversarial Attack.pdf
  4. +2
    -1
      README.md

BIN
2022 ML/10 Attack/Attacks-in-NLP-Draft.pdf View File


+ 987
- 0
2022 ML/10 Attack/ML2022_hw10.ipynb
File diff suppressed because it is too large
View File


BIN
2022 ML/10 Attack/Machine Learning HW10 Adversarial Attack.pdf View File


+ 2
- 1
README.md View File

@@ -45,6 +45,7 @@ ppt/pdf支持直链下载。
|2022/04/16|更新HW7| |2022/04/16|更新HW7|
|2022/04/23|更新HW8| |2022/04/23|更新HW8|
|2022/04/30|更新Lecture 9 & Lecture10,HW9| |2022/04/30|更新Lecture 9 & Lecture10,HW9|
|2022/05/06|更新HW10|


**** ****
@@ -77,7 +78,7 @@ ppt/pdf支持直链下载。
|Lecture 7|[自监督学习(一)芝麻街与进击的巨人](https://www.bilibili.com/video/BV1Wv411h7kN?p=71)<br/>[自监督学习(二)BERT简介](https://www.bilibili.com/video/BV1Wv411h7kN?p=72)<br/>[自监督学习(三)BERT的奇闻轶事](https://www.bilibili.com/video/BV1Wv411h7kN?p=73)<br/>[自监督学习(四)GPT的野望](https://www.bilibili.com/video/BV1Wv411h7kN?p=74)|Video:<br/>[如何有效的使用自督导式模型](https://www.bilibili.com/video/BV1Wv411h7kN?p=75)<br/>[语音与影像上的神奇自督导式学习模型](https://www.bilibili.com/video/BV1Wv411h7kN?p=76)<br/><br/>PDF:<br/>[Recent Advance of Self-supervied learning for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/PLM.pdf)<br/>[SSL for Speech and Image](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/SSL_speech_image%20(v9).pdf)|[BERT (part 1)](https://www.bilibili.com/video/BV1Wv411h7kN?p=77)<br/>[BERT (part 2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=78)<br/>[GPT-3](https://www.bilibili.com/video/BV1Wv411h7kN?p=80)|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=82)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/hw7_slides.pdf)<br/>[Code](https://colab.research.google.com/drive/1QloQ42zYwX_ETAs2GIkeh8qFj0UjHXfH?usp=sharing)<br/>[Submission](https://www.kaggle.com/c/ml2022spring-hw7)| |Lecture 7|[自监督学习(一)芝麻街与进击的巨人](https://www.bilibili.com/video/BV1Wv411h7kN?p=71)<br/>[自监督学习(二)BERT简介](https://www.bilibili.com/video/BV1Wv411h7kN?p=72)<br/>[自监督学习(三)BERT的奇闻轶事](https://www.bilibili.com/video/BV1Wv411h7kN?p=73)<br/>[自监督学习(四)GPT的野望](https://www.bilibili.com/video/BV1Wv411h7kN?p=74)|Video:<br/>[如何有效的使用自督导式模型](https://www.bilibili.com/video/BV1Wv411h7kN?p=75)<br/>[语音与影像上的神奇自督导式学习模型](https://www.bilibili.com/video/BV1Wv411h7kN?p=76)<br/><br/>PDF:<br/>[Recent Advance of Self-supervied learning for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/PLM.pdf)<br/>[SSL for Speech and Image](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/SSL_speech_image%20(v9).pdf)|[BERT (part 1)](https://www.bilibili.com/video/BV1Wv411h7kN?p=77)<br/>[BERT (part 2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=78)<br/>[GPT-3](https://www.bilibili.com/video/BV1Wv411h7kN?p=80)|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=82)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/hw7_slides.pdf)<br/>[Code](https://colab.research.google.com/drive/1QloQ42zYwX_ETAs2GIkeh8qFj0UjHXfH?usp=sharing)<br/>[Submission](https://www.kaggle.com/c/ml2022spring-hw7)|
|Lecture 8|[自编码器 (Auto-encoder) (上) – 基本概念](https://www.bilibili.com/video/BV1Wv411h7kN?p=83)<br/>[自编码器 (Auto-encoder) (下) – 领结变声器与更多应用](https://www.bilibili.com/video/BV1Wv411h7kN?p=84)<br/>[Anomaly Detection (1_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=85)<br/>[Anomaly Detection (2_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=86)<br/>[Anomaly Detection (3_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=87)<br/>[Anomaly Detection (4_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=88)<br/>[Anomaly Detection (5_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=89)<br/>[Anomaly Detection (6_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=90)<br/>[Anomaly Detection (7_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=91)|Video:<br/>[None]<br/><br/>PDF:<br/>[None]<br/>|[PCA](https://www.bilibili.com/video/BV1Wv411h7kN?p=92)<br/>[t-SNE](https://www.bilibili.com/video/BV1Wv411h7kN?p=93)|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=95)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Machine%20Learning%20Homework%208%20Anomaly%20Detection.pdf)<br/>[Code](https://colab.research.google.com/drive/16J23Uqkclro8zvp5Y1EXFtEWOvMA9YXC#scrollTo=JoW1UrrxgI_U)<br/>[Submission](https://www.kaggle.com/competitions/ml2022spring-hw8/)| |Lecture 8|[自编码器 (Auto-encoder) (上) – 基本概念](https://www.bilibili.com/video/BV1Wv411h7kN?p=83)<br/>[自编码器 (Auto-encoder) (下) – 领结变声器与更多应用](https://www.bilibili.com/video/BV1Wv411h7kN?p=84)<br/>[Anomaly Detection (1_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=85)<br/>[Anomaly Detection (2_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=86)<br/>[Anomaly Detection (3_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=87)<br/>[Anomaly Detection (4_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=88)<br/>[Anomaly Detection (5_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=89)<br/>[Anomaly Detection (6_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=90)<br/>[Anomaly Detection (7_7)](https://www.bilibili.com/video/BV1Wv411h7kN?p=91)|Video:<br/>[None]<br/><br/>PDF:<br/>[None]<br/>|[PCA](https://www.bilibili.com/video/BV1Wv411h7kN?p=92)<br/>[t-SNE](https://www.bilibili.com/video/BV1Wv411h7kN?p=93)|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=95)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Machine%20Learning%20Homework%208%20Anomaly%20Detection.pdf)<br/>[Code](https://colab.research.google.com/drive/16J23Uqkclro8zvp5Y1EXFtEWOvMA9YXC#scrollTo=JoW1UrrxgI_U)<br/>[Submission](https://www.kaggle.com/competitions/ml2022spring-hw8/)|
|Lecture 9|[机器学习的可解释性 (上) – 为什么神经网络可以正确分辨宝可梦和数码宝贝](https://www.bilibili.com/video/BV1Wv411h7kN?p=96)<br/>[机器学习的可解释性 (下) –机器心中的猫长什么样子](https://www.bilibili.com/video/BV1Wv411h7kN?p=77)|Video:<br/>[自然语言处理上的对抗式攻击 Part1](https://www.bilibili.com/video/BV1Wv411h7kN?p=98)<br/><br/>PDF:<br/>[Adversarial Attack for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Attacks-in-NLP-Draft.pdf)<br/>|[None]|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=100)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Machine%20Learning%20HW9.pdf)<br/>[Code](https://colab.research.google.com/drive/1DvQX9apokZHZNfZeG7brJS6XbsGpPFYU?usp=sharing)| |Lecture 9|[机器学习的可解释性 (上) – 为什么神经网络可以正确分辨宝可梦和数码宝贝](https://www.bilibili.com/video/BV1Wv411h7kN?p=96)<br/>[机器学习的可解释性 (下) –机器心中的猫长什么样子](https://www.bilibili.com/video/BV1Wv411h7kN?p=77)|Video:<br/>[自然语言处理上的对抗式攻击 Part1](https://www.bilibili.com/video/BV1Wv411h7kN?p=98)<br/><br/>PDF:<br/>[Adversarial Attack for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Attacks-in-NLP-Draft.pdf)<br/>|[None]|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=100)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Machine%20Learning%20HW9.pdf)<br/>[Code](https://colab.research.google.com/drive/1DvQX9apokZHZNfZeG7brJS6XbsGpPFYU?usp=sharing)|
|Lecture 10|[来自人类的恶意攻击 (Adversarial Attack) (上) – 基本概念](https://www.bilibili.com/video/BV1Wv411h7kN?p=101)<br/>[2021 - 来自人类的恶意攻击 (Adversarial Attack) (下) – 类神经网络能否躲过人类深不见底的恶意](https://www.bilibili.com/video/BV1Wv411h7kN?p=102)|Video:<br/>[自然语言处理上的对抗式攻击 Part2](https://www.bilibili.com/video/BV1Wv411h7kN?p=103)<br/><br/>PDF:<br/>[Adversarial Attack for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Attacks-in-NLP-Draft.pdf)|[More about Adversarial Attack (1_2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=104)<br/>[More about Adversarial Attack (2_2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=105)|[Video]<br/>[Slide]<br/>[Code]<br/>[Submission]|
|Lecture 10|[来自人类的恶意攻击 (Adversarial Attack) (上) – 基本概念](https://www.bilibili.com/video/BV1Wv411h7kN?p=101)<br/>[2021 - 来自人类的恶意攻击 (Adversarial Attack) (下) – 类神经网络能否躲过人类深不见底的恶意](https://www.bilibili.com/video/BV1Wv411h7kN?p=102)|Video:<br/>[自然语言处理上的对抗式攻击 Part2](https://www.bilibili.com/video/BV1Wv411h7kN?p=103)<br/><br/>PDF:<br/>[Adversarial Attack for NLP](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Attacks-in-NLP-Draft.pdf)|[More about Adversarial Attack (1_2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=104)<br/>[More about Adversarial Attack (2_2)](https://www.bilibili.com/video/BV1Wv411h7kN?p=105)|[Video](https://www.bilibili.com/video/BV1Wv411h7kN?p=109)<br/>[Slide](https://speech.ee.ntu.edu.tw/~hylee/ml/ml2022-course-data/Machine%20Learning%20HW10%20Adversarial%20Attack.pdf)<br/>[Code](https://colab.research.google.com/drive/1BcYS4bAInDCTo4Ilsc6w4o_SEoFTuHSO?usp=sharing)<br/>[Submission](https://ml.ee.ntu.edu.tw/hw10/)|


**** ****
[![BILIBILI](https://raw.githubusercontent.com/Fafa-DL/readme-data/main/gzh.jpg)](https://space.bilibili.com/46880349) [![BILIBILI](https://raw.githubusercontent.com/Fafa-DL/readme-data/main/gzh.jpg)](https://space.bilibili.com/46880349)

Loading…
Cancel
Save