暂无分享,去创建一个
Junchi Yan | Xiaokang Yang | Han Lu | Zenan Li | Runzhong Wang | Qibing Ren | Junchi Yan | Xiaokang Yang | Han Lu | Zenan Li | Runzhong Wang | Qibing Ren
[1] Hyun Oh Song,et al. Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization , 2019, ICML.
[2] Ah Chung Tsoi,et al. The Graph Neural Network Model , 2009, IEEE Transactions on Neural Networks.
[3] Keld Helsgaun,et al. An Extension of the Lin-Kernighan-Helsgaun TSP Solver for Constrained Traveling Salesman and Vehicle Routing Problems: Technical report , 2017 .
[4] Srikanth Kandula,et al. Multi-resource packing for cluster schedulers , 2014, SIGCOMM.
[5] Youngjune Gwon,et al. Matrix Encoding Networks for Neural Combinatorial Optimization , 2021, NeurIPS.
[6] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Le Song,et al. 2 Common Formulation for Greedy Algorithms on Graphs , 2018 .
[9] Carlo Curino,et al. Apache Tez: A Unifying Framework for Modeling and Building Data Processing Applications , 2015, SIGMOD Conference.
[10] Yoshua Bengio,et al. Machine Learning for Combinatorial Optimization: a Methodological Tour d'Horizon , 2018, Eur. J. Oper. Res..
[11] Yang Zhou,et al. Adversarial Attacks on Deep Graph Matching , 2020, NeurIPS.
[12] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[13] Navdeep Jaitly,et al. Pointer Networks , 2015, NIPS.
[14] Weixiong Zhang,et al. The Asymmetric Traveling Salesman Problem: Algorithms, Instance Generators, and Tests , 2001, ALENEX.
[15] Yelong Shen,et al. Integrated Defense for Resilient Graph Matching , 2021, ICML.
[16] Darrell Whitley,et al. A genetic algorithm tutorial , 1994, Statistics and Computing.
[17] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[18] Nina Narodytska,et al. Simple Black-Box Adversarial Perturbations for Deep Networks , 2016, ArXiv.
[19] Peter Rossmanith,et al. Simulated Annealing , 2008, Taschenbuch der Algorithmen.
[20] Christoph Buchheim,et al. Robust combinatorial optimization under convex and discrete cost uncertainty , 2018, EURO J. Comput. Optim..
[21] Craig Chambers,et al. FlumeJava: easy, efficient data-parallel pipelines , 2010, PLDI '10.
[22] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[23] Zhiyuan Liu,et al. Word-level Textual Adversarial Attacking as Combinatorial Optimization , 2019, ACL.
[24] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[26] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[27] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[28] Hongzi Mao,et al. Learning scheduling algorithms for data processing clusters , 2018, SIGCOMM.
[29] Michael J. Franklin,et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing , 2012, NSDI.