Analyzing and Improving Representations with the Soft Nearest Neighbor Loss
暂无分享,去创建一个
[1] Trevor Darrell,et al. Auxiliary Image Regularization for Deep CNNs with Noisy Labels , 2015, ICLR.
[2] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[3] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[4] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[5] Hossein Mobahi,et al. Large Margin Deep Networks for Classification , 2018, NeurIPS.
[6] O. Chapelle,et al. Semi-Supervised Learning (Chapelle, O. et al., Eds.; 2006) [Book reviews] , 2009, IEEE Transactions on Neural Networks.
[7] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[8] Geoffrey E. Hinton,et al. Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure , 2007, AISTATS.
[9] Geoffrey E. Hinton,et al. Regularizing Neural Networks by Penalizing Confident Output Distributions , 2017, ICLR.
[10] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[11] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[12] Geoffrey E. Hinton,et al. Neighbourhood Components Analysis , 2004, NIPS.
[13] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[15] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[16] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[17] Nir Ailon,et al. Deep Metric Learning Using Triplet Network , 2014, SIMBAD.
[18] D. Sculley,et al. Google Vizier: A Service for Black-Box Optimization , 2017, KDD.
[19] Saeed Mahloujifar,et al. The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure , 2018, AAAI.
[20] Patrick D. McDaniel,et al. Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning , 2018, ArXiv.
[21] Andreas Krause,et al. Parallelizing Exploration-Exploitation Tradeoffs with Gaussian Process Bandit Optimization , 2012, ICML.
[22] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.