Robustness of Neural Networks: A Probabilistic and Practical Approach
暂无分享,去创建一个
[1] Christian P. Robert,et al. Monte Carlo Statistical Methods , 2005, Springer Texts in Statistics.
[2] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[3] Aws Albarghouthi,et al. FairSquare: probabilistic verification of program fairness , 2017, Proc. ACM Program. Lang..
[4] Nicolas Halbwachs,et al. Automatic discovery of linear restraints among variables of a program , 1978, POPL.
[5] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[6] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[7] Sriram Sankaranarayanan,et al. Static Analysis in Disjunctive Numerical Domains , 2006, SAS.
[8] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[9] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[10] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[11] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[13] Toniann Pitassi,et al. Fairness through awareness , 2011, ITCS '12.
[14] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[15] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[16] Antonio Criminisi,et al. Measuring Neural Net Robustness with Constraints , 2016, NIPS.
[17] Gilles Barthe,et al. Relational Verification Using Product Programs , 2011, FM.
[18] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.