On Adversarial Robustness: A Neural Architecture Search perspective
暂无分享,去创建一个
Gaurav Mittal | Vineeth N Balasubramanian | Devansh Agarwal | Chaitanya Devaguptapu | V. Balasubramanian | Pulkit Gopalani | Gaurav Mittal | Devansh Agarwal | Chaitanya Devaguptapu
[1] Andrew Zisserman,et al. Automated Flower Classification over a Large Number of Classes , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[2] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[3] Rui Xu,et al. When NAS Meets Robustness: In Search of Robust Architectures Against Adversarial Attacks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Qian Zhang,et al. Densely Connected Search Space for More Flexible Neural Architecture Search , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Jinfeng Yi,et al. Is Robustness the Cost of Accuracy? - A Comprehensive Study on the Robustness of 18 Deep Image Classification Models , 2018, ECCV.
[6] Matthias Hein,et al. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.
[7] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[8] Quoc V. Le,et al. Efficient Neural Architecture Search via Parameter Sharing , 2018, ICML.
[9] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Yiming Yang,et al. DARTS: Differentiable Architecture Search , 2018, ICLR.
[11] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Hoki Kim. Torchattacks : A Pytorch Repository for Adversarial Attacks , 2020, ArXiv.
[13] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[14] Kalyanmoy Deb,et al. NSGA-Net: neural architecture search using multi-objective genetic algorithm , 2018, GECCO.
[15] Qi Tian,et al. Progressive Differentiable Architecture Search: Bridging the Depth Gap Between Search and Evaluation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[16] Ning Chen,et al. Improving Adversarial Robustness via Promoting Ensemble Diversity , 2019, ICML.
[17] Yeha Lee,et al. Resource Optimized Neural Architecture Search for 3D Medical Image Segmentation , 2019, MICCAI.
[18] Jiameng Fan,et al. Adversarial Training and Provable Robustness: A Tale of Two Objectives , 2021, AAAI.
[19] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[20] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[21] Xiao Zeng,et al. HM-NAS: Efficient Neural Architecture Search via Hierarchical Masking , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[22] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[23] J. Zico Kolter,et al. Fast is better than free: Revisiting adversarial training , 2020, ICLR.
[24] Seyed-Mohsen Moosavi-Dezfooli,et al. SparseFool: A Few Pixels Make a Big Difference , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[26] Alan L. Yuille,et al. Intriguing Properties of Adversarial Training at Scale , 2020, ICLR.
[27] Kalyanmoy Deb,et al. NSGA-NET: A Multi-Objective Genetic Algorithm for Neural Architecture Search , 2018, ArXiv.
[28] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[29] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[30] Hang Su,et al. Bag of Tricks for Adversarial Training , 2020, ICLR.
[31] Xiaopeng Zhang,et al. PC-DARTS: Partial Channel Connections for Memory-Efficient Architecture Search , 2020, ICLR.
[32] Quoc V. Le,et al. EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks , 2019, ICML.
[33] Deming Chen,et al. NAIS: Neural Architecture and Implementation Search and its Applications in Autonomous Driving , 2019, 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[34] Alok Aggarwal,et al. Regularized Evolution for Image Classifier Architecture Search , 2018, AAAI.
[35] Quoc V. Le,et al. EfficientDet: Scalable and Efficient Object Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Song Han,et al. ProxylessNAS: Direct Neural Architecture Search on Target Task and Hardware , 2018, ICLR.
[37] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[38] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.
[40] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[41] Li Fei-Fei,et al. Progressive Neural Architecture Search , 2017, ECCV.
[42] Fabio Maria Carlucci,et al. NAS evaluation is frustratingly hard , 2020, ICLR.
[43] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[44] Kui Ren,et al. Adversarial Attacks and Defenses in Deep Learning , 2020, Engineering.
[45] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[46] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[47] Quoc V. Le,et al. Smooth Adversarial Training , 2020, ArXiv.
[48] Danilo Vasconcellos Vargas,et al. Evolving Robust Neural Architectures to Defend from Adversarial Attacks , 2019, AISafety@IJCAI.
[49] Larry S. Davis,et al. Adversarial Training for Free! , 2019, NeurIPS.
[50] Quoc V. Le,et al. Neural Architecture Search with Reinforcement Learning , 2016, ICLR.