Robustness for Non-Parametric Classification: A Generic Attack and Defense
暂无分享,去创建一个
[1] Matthias Hein,et al. Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks , 2019, NeurIPS.
[2] Dylan Hadfield-Menell,et al. Adversarial Training with Voronoi Constraints , 2019, ArXiv.
[3] Alexandros G. Dimakis,et al. Provable Certificates for Adversarial Examples: Fitting a Ball in the Union of Polytopes , 2019, NeurIPS.
[4] David A. Wagner,et al. On the Robustness of Deep K-Nearest Neighbors , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[5] Abhimanyu Dubey,et al. Defense Against Adversarial Images Using Web-Scale Nearest-Neighbor Search , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Cho-Jui Hsieh,et al. Robust Decision Trees Against Adversarial Examples , 2019, ICML.
[7] Aleksander Madry,et al. On Evaluating Adversarial Robustness , 2019, ArXiv.
[8] Sahil Singla,et al. Robustness Certificates Against Adversarial Examples for ReLU Networks , 2019, ArXiv.
[9] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[10] Alessio Lomuscio,et al. Formal Verification of CNN-based Perception Systems , 2018, ArXiv.
[11] Matthias Hein,et al. Provable Robustness of ReLU networks via Maximization of Linear Regions , 2018, AISTATS.
[12] Kun He,et al. Improving the Generalization of Adversarial Training with Domain Adaptation , 2018, ICLR.
[13] Aleksander Madry,et al. Training for Faster Adversarial Robustness Verification via Inducing ReLU Stability , 2018, ICLR.
[14] Jinfeng Yi,et al. Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach , 2018, ICLR.
[15] Patrick D. McDaniel,et al. Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning , 2018, ArXiv.
[16] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[17] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[18] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[19] James Bailey,et al. The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[20] Russ Tedrake,et al. Evaluating Robustness of Neural Networks with Mixed Integer Programming , 2017, ICLR.
[21] John C. Duchi,et al. Certifying Some Distributional Robustness with Principled Adversarial Training , 2017, ICLR.
[22] Mykel J. Kochenderfer,et al. Towards Proving the Adversarial Robustness of Deep Neural Networks , 2017, FVAV@iFM.
[23] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[24] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[25] Somesh Jha,et al. Analyzing the Robustness of Nearest Neighbors to Adversarial Examples , 2017, ICML.
[26] Matthias Hein,et al. Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation , 2017, NIPS.
[27] Aryeh Kontorovich,et al. Nearest-Neighbor Sample Compression: Efficiency, Consistency, Infinite Dimensions , 2017, NIPS.
[28] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[29] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[30] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[31] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[32] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[33] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[34] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[35] J. Doug Tygar,et al. Evasion and Hardening of Tree Ensemble Classifiers , 2015, ICML.
[36] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[37] Aryeh Kontorovich,et al. A Bayes consistent 1-NN classifier , 2014, AISTATS.
[38] Sanjoy Dasgupta,et al. Rates of Convergence for Nearest Neighbor Classification , 2014, NIPS.
[39] Lee-Ad Gottlieb,et al. Near-Optimal Sample Compression for Nearest Neighbors , 2014, IEEE Transactions on Information Theory.
[40] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[41] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[42] Robert Krauthgamer,et al. Efficient Classification for Metric Data , 2013, IEEE Transactions on Information Theory.
[43] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[44] Stephen P. Boyd,et al. Convex Optimization , 2004, IEEE Transactions on Automatic Control.
[45] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[46] G. Lugosi,et al. On the Strong Universal Consistency of Nearest Neighbor Regression Function Estimates , 1994 .
[47] Franz Aurenhammer,et al. Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.
[48] Ketan Mulmuley,et al. On levels in arrangements and voronoi diagrams , 1991, Discret. Comput. Geom..
[49] Richard M. Karp,et al. A n^5/2 Algorithm for Maximum Matchings in Bipartite Graphs , 1971, SWAT.
[50] Nicholas Carlini,et al. Evaluation and Design of Robust Neural Network Defenses , 2018 .
[51] John C. Duchi,et al. Certifiable Distributional Robustness with Principled Adversarial Training , 2017, ArXiv.
[52] Martin Krzywinski,et al. Points of Significance: Classification and regression trees , 2017, Nature Methods.
[53] Seth Pettie,et al. Linear-Time Approximation for Maximum Weight Matching , 2014, JACM.
[54] Emanuele Della Valle,et al. An Introduction to Information Retrieval , 2013 .
[55] L. Breiman. Random Forests , 2001, Machine Learning.
[56] G. Gates. The Reduced Nearest Neighbor Rule , 1998 .
[57] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[58] C. G. Hilborn,et al. The Condensed Nearest Neighbor Rule , 1967 .