暂无分享,去创建一个
[1] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Yee Whye Teh,et al. A Statistical Approach to Assessing Neural Network Robustness , 2018, ICLR.
[3] Geoffrey E. Hinton,et al. Experiments on Learning by Back Propagation. , 1986 .
[4] Shai Ben-David,et al. Understanding Machine Learning: From Theory to Algorithms , 2014 .
[5] Jocelyn Sietsma,et al. Creating artificial neural networks that generalize , 1991, Neural Networks.
[6] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Aleksander Madry,et al. Adversarially Robust Generalization Requires More Data , 2018, NeurIPS.
[9] C. Lee Giles,et al. An analysis of noise in recurrent neural networks: convergence and generalization , 1996, IEEE Trans. Neural Networks.
[10] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[11] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[12] Kannan Ramchandran,et al. Rademacher Complexity for Adversarially Robust Generalization , 2018, ICML.
[13] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[14] N. Hengartner,et al. Simulation and Estimation of Extreme Quantiles and Extreme Probabilities , 2011 .
[15] Matus Telgarsky,et al. Spectrally-normalized margin bounds for neural networks , 2017, NIPS.
[16] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[17] Andrew R. Webb,et al. Functional approximation by feed-forward networks: a least-squares approach to generalization , 1994, IEEE Trans. Neural Networks.
[18] Guozhong An,et al. The Effects of Adding Noise During Backpropagation Training on a Generalization Performance , 1996, Neural Computation.
[19] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[20] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[21] Laurent El Ghaoui,et al. Robust Optimization , 2021, ICORES.
[22] Pascal Frossard,et al. Analysis of classifiers’ robustness to adversarial perturbations , 2015, Machine Learning.
[23] Saeed Mahloujifar,et al. Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution , 2018, NeurIPS.
[24] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Junfeng Yang,et al. Efficient Formal Safety Analysis of Neural Networks , 2018, NeurIPS.
[26] Christopher M. Bishop,et al. Current address: Microsoft Research, , 2022 .
[27] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[28] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[29] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] Petri Koistinen,et al. Using additive noise in back-propagation training , 1992, IEEE Trans. Neural Networks.
[31] M. Talagrand,et al. Probability in Banach Spaces: Isoperimetry and Processes , 1991 .
[32] Sida I. Wang,et al. Dropout Training as Adaptive Regularization , 2013, NIPS.
[33] D Zipser,et al. Learning the hidden structure of speech. , 1988, The Journal of the Acoustical Society of America.
[34] Quoc V. Le,et al. Adding Gradient Noise Improves Learning for Very Deep Networks , 2015, ArXiv.
[35] J. I. Minnix. Fault tolerance of the backpropagation neural network trained on noisy inputs , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[36] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[37] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Viktor Kuncak,et al. Computer Aided Verification , 2017, Lecture Notes in Computer Science.