暂无分享,去创建一个
Moustapha Cissé | Yann Dauphin | Nicolas Usunier | Edouard Grave | Piotr Bojanowski | Yann Dauphin | Moustapha Cissé | Edouard Grave | Nicolas Usunier | Piotr Bojanowski | Y. Dauphin
[1] C. Michelot. A finite algorithm for finding the projection of a point onto the canonical simplex of ∝n , 1986 .
[2] Panos M. Pardalos,et al. An algorithm for a singly constrained class of quadratic programs subject to upper and lower bounds , 1990, Math. Program..
[3] Harris Drucker,et al. Improving generalization performance using double backpropagation , 1992, IEEE Trans. Neural Networks.
[4] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[5] Petros Drineas,et al. Fast Monte Carlo Algorithms for Matrices I: Approximating Matrix Multiplication , 2006, SIAM J. Comput..
[6] Sanjoy Dasgupta,et al. Random projection trees and low dimensional manifolds , 2008, STOC.
[7] Jelena Kovacevic,et al. An Introduction to Frames , 2008, Found. Trends Signal Process..
[8] Yoram Singer,et al. Efficient projections onto the l1-ball for learning in high dimensions , 2008, ICML '08.
[9] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[10] Levent Tunçel,et al. Optimization algorithms on matrix manifolds , 2009, Math. Comput..
[11] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[12] Shie Mannor,et al. Robustness and generalization , 2010, Machine Learning.
[13] Michael W. Mahoney. Randomized Algorithms for Matrices and Data , 2011, Found. Trends Mach. Learn..
[14] Qiang Chen,et al. Network In Network , 2013, ICLR.
[15] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[16] Joan Bruna,et al. Exploiting Linear Structure Within Convolutional Networks for Efficient Evaluation , 2014, NIPS.
[17] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[19] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[20] Uri Shaham,et al. Understanding Adversarial Training: Increasing Local Stability of Neural Nets through Robust Optimization , 2015, ArXiv.
[21] Shin Ishii,et al. Distributional Smoothing with Virtual Adversarial Training , 2015, ICLR 2016.
[22] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[23] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Tim Salimans,et al. Weight Normalization: A Simple Reparameterization to Accelerate Training of Deep Neural Networks , 2016, NIPS.
[25] Laurent Condat,et al. A Fast Projection onto the Simplex and the l 1 Ball , 2015 .
[26] Kilian Q. Weinberger,et al. Deep Networks with Stochastic Depth , 2016, ECCV.
[27] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Seyed-Mohsen Moosavi-Dezfooli,et al. Robustness of classifiers: from adversarial to random noise , 2016, NIPS.
[29] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[30] Chong Wang,et al. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin , 2015, ICML.
[31] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[32] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[33] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[35] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[36] Pascal Frossard,et al. Analysis of classifiers’ robustness to adversarial perturbations , 2015, Machine Learning.