ModelGiF: Gradient Fields for Model Functional Distance
暂无分享,去创建一个
Jie Song | Sai Wu | Mingli Song | Zhenxing Xu | Gang Chen
[1] Jian Liang,et al. Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks , 2022, NeurIPS.
[2] Dawn Song,et al. Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[3] Yunxin Liu,et al. ModelDiff: testing-based DNN similarity comparison for model reuse detection , 2021, ISSTA.
[4] Nicolas Papernot,et al. Proof-of-Learning: Definitions and Practice , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[5] Vijay Ganesh,et al. Amnesiac Machine Learning , 2020, AAAI.
[6] Yixin Chen,et al. DEPARA: Deep Attribution Graph for Deep Knowledge Transferability , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Nicolas Papernot,et al. Entangled Watermarks as a Defense against Model Extraction , 2020, USENIX Security Symposium.
[8] Christopher A. Choquette-Choo,et al. Machine Unlearning , 2019, 2021 IEEE Symposium on Security and Privacy (SP).
[9] Florian Kerschbaum,et al. Deep Neural Network Fingerprinting by Conferrable Adversarial Examples , 2019, ICLR.
[10] Jinyuan Jia,et al. IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary , 2019, ArXiv.
[11] Yixin Chen,et al. Deep Model Transferability from Attribution Maps , 2019, NeurIPS.
[12] Chee Seng Chan,et al. [Extended version] Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks , 2019, 1909.07830.
[13] Nicolas Papernot,et al. High Accuracy and High Fidelity Extraction of Neural Networks , 2019, USENIX Security Symposium.
[14] Leonidas J. Guibas,et al. An Information-Theoretic Approach to Transferability in Task Transfer Learning , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[15] Pavlo Molchanov,et al. Importance Estimation for Neural Network Pruning , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Seong Joon Oh,et al. CutMix: Regularization Strategy to Train Strong Classifiers With Localizable Features , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[17] Kshitij Dwivedi,et al. Representation Similarity Analysis for Efficient Task Taxonomy & Transfer Learning , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Subhransu Maji,et al. Task2Vec: Task Embedding for Meta-Learning , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[19] Tribhuvanesh Orekondy,et al. Knockoff Nets: Stealing Functionality of Black-Box Models , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Yu Zhang,et al. Transfer Learning via Learning to Transfer , 2018, ICML.
[21] Brendan Dolan-Gavitt,et al. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks , 2018, RAID.
[22] Jialong Zhang,et al. Protecting Intellectual Property of Deep Neural Networks with Watermarking , 2018, AsiaCCS.
[23] Samuel Marchal,et al. PRADA: Protecting Against DNN Model Stealing Attacks , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[24] Leonidas J. Guibas,et al. Taskonomy: Disentangling Task Transfer Learning , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[25] Stefan Wermter,et al. Continual Lifelong Learning with Neural Networks: A Review , 2018, Neural Networks.
[26] Benny Pinkas,et al. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring , 2018, USENIX Security Symposium.
[27] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[28] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[29] George Papandreou,et al. Rethinking Atrous Convolution for Semantic Image Segmentation , 2017, ArXiv.
[30] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.
[31] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[32] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[33] A. Juels,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[34] Anna Shcherbina,et al. Not Just a Black Box: Learning Important Features Through Propagating Activation Differences , 2016, ArXiv.
[35] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[37] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[38] Junfeng Yang,et al. Towards Making Systems Forget with Machine Unlearning , 2015, 2015 IEEE Symposium on Security and Privacy.
[39] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[40] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[41] Yoshua Bengio,et al. How transferable are features in deep neural networks? , 2014, NIPS.
[42] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[43] A. Razavian,et al. Factors of Transferability for a Generic ConvNet Representation , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[44] Stefan Carlsson,et al. CNN Features Off-the-Shelf: An Astounding Baseline for Recognition , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[45] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[46] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[47] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[48] Shai Ben-David,et al. Detecting Change in Data Streams , 2004, VLDB.
[49] Ernan McMullin,et al. The Origins of the Field Concept in Physics , 2002 .
[50] R. Leighton,et al. Feynman Lectures on Physics , 1971 .
[51] R. Leighton,et al. The Feynman Lectures on Physics; Vol. I , 1965 .
[52] Nicolas Papernot,et al. A Zest of LIME: Towards Architecture-Independent Model Distances , 2022, ICLR.
[53] Shai Ben-David,et al. Exploiting Task Relatedness for Mulitple Task Learning , 2003, COLT.
[54] Holger Theisel,et al. Vector field curvature and applications , 1995 .
[55] Marco Tulio Ribeiro,et al. Association for Computational Linguistics " Why Should I Trust You? " Explaining the Predictions of Any Classifier , 2022 .