Verifying Recurrent Neural Networks using Invariant Inference
暂无分享,去创建一个
[1] Ngai Wong,et al. POPQORN: Quantifying Robustness of Recurrent Neural Networks , 2019, ICML.
[2] Isil Dillig,et al. Simplifying Loop Invariant Generation Using Splitter Predicates , 2011, CAV.
[3] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[4] Junichi Yamagishi,et al. SUPERSEDED - CSTR VCTK Corpus: English Multi-speaker Corpus for CSTR Voice Cloning Toolkit , 2016 .
[5] Junfeng Yang,et al. Formal Security Analysis of Neural Networks using Symbolic Intervals , 2018, USENIX Security Symposium.
[6] Antonio Criminisi,et al. Measuring Neural Net Robustness with Constraints , 2016, NIPS.
[7] Guy Katz,et al. An Abstraction-Based Framework for Neural Network Verification , 2020, CAV.
[8] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[9] Chung-Hao Huang,et al. Verification of Binarized Neural Networks via Inter-neuron Factoring - (Short Paper) , 2017, VSTTE.
[10] Guy Katz,et al. Simplifying Neural Networks with the Marabou Verification Engine , 2019, ArXiv.
[11] Junichi Yamagishi,et al. CSTR VCTK Corpus: English Multi-speaker Corpus for CSTR Voice Cloning Toolkit (version 0.92) , 2019 .
[12] Alessio Lomuscio,et al. Verification of RNN-Based Neural Agent-Environment Systems , 2019, AAAI.
[13] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[14] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[15] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[16] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[17] Yuval Rabani,et al. Linear Programming , 2007, Handbook of Approximation Algorithms and Metaheuristics.
[18] Alessio Lomuscio,et al. An approach to reachability analysis for feed-forward ReLU neural networks , 2017, ArXiv.
[19] Abdenour Hadid,et al. Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.
[20] Pushmeet Kohli,et al. A Unified View of Piecewise Linear Neural Network Verification , 2017, NeurIPS.
[21] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[22] Mykel J. Kochenderfer,et al. The Marabou Framework for Verification and Analysis of Deep Neural Networks , 2019, CAV.
[23] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[24] Junichi Yamagishi,et al. CSTR VCTK Corpus: English Multi-speaker Corpus for CSTR Voice Cloning Toolkit , 2017 .
[25] Russ Tedrake,et al. Evaluating Robustness of Neural Networks with Mixed Integer Programming , 2017, ICLR.
[26] Quan Wang,et al. Generalized End-to-End Loss for Speaker Verification , 2017, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[28] Michael Schapira,et al. Verifying Deep-RL-Driven Systems , 2019, NetAI@SIGCOMM.
[29] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[30] Georg Heigold,et al. End-to-end text-dependent speaker verification , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[31] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[32] Leonid Ryzhyk,et al. Verifying Properties of Binarized Deep Neural Networks , 2017, AAAI.
[33] Facebook,et al. Houdini : Fooling Deep Structured Visual and Speech Recognition Models with Adversarial Examples , 2017 .
[34] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[35] Timon Gehr,et al. An abstract domain for certifying neural networks , 2019, Proc. ACM Program. Lang..
[36] Nicolas Halbwachs,et al. Automatic discovery of linear restraints among variables of a program , 1978, POPL.
[37] Nebojsa Jojic,et al. Program verification as probabilistic inference , 2007, POPL '07.
[38] Bowen Zhou,et al. Sequence-to-Sequence RNNs for Text Summarization , 2016, ArXiv.
[39] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[40] Corina S. Pasareanu,et al. DeepSafe: A Data-Driven Approach for Assessing Robustness of Neural Networks , 2018, ATVA.
[41] Mykel J. Kochenderfer,et al. Policy compression for aircraft collision avoidance systems , 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC).
[42] Guy Katz,et al. Minimal Modifications of Deep Neural Networks using Verification , 2020, LPAR.
[43] Mykel J. Kochenderfer,et al. Towards Proving the Adversarial Robustness of Deep Neural Networks , 2017, FVAV@iFM.
[44] Guillaume Lample,et al. Playing FPS Games with Deep Reinforcement Learning , 2016, AAAI.
[45] Chih-Hong Cheng,et al. Maximum Resilience of Artificial Neural Networks , 2017, ATVA.
[46] Thomas A. Henzinger,et al. The software model checker Blast , 2007, International Journal on Software Tools for Technology Transfer.
[47] Guy Katz,et al. Simplifying Neural Networks Using Formal Verification , 2020, NFM.
[48] Nham Le,et al. Verification of Recurrent Neural Networks for Cognitive Tasks via Reachability Analysis , 2020, ECAI.
[49] Neil Immerman,et al. Decidability of inferring inductive invariants , 2016, POPL.
[50] Ashish Tiwari,et al. Output Range Analysis for Deep Neural Networks , 2017, ArXiv.
[51] Rüdiger Ehlers,et al. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks , 2017, ATVA.
[52] Moustapha Cissé,et al. Fooling End-To-End Speaker Verification With Adversarial Examples , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[53] Corina S. Pasareanu,et al. DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks , 2017, ArXiv.
[54] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[55] Clark W. Barrett,et al. Provably Minimally-Distorted Adversarial Examples , 2017 .
[56] Andrew Ruef,et al. Counterexample-guided approach to finding numerical invariants , 2017, ESEC/SIGSOFT FSE.
[57] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[58] Mykel J. Kochenderfer,et al. Toward Scalable Verification for Safety-Critical Deep Networks , 2018, ArXiv.
[59] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[60] Le Song,et al. Learning Loop Invariants for Program Verification , 2018, NeurIPS.
[61] Corina S. Pasareanu,et al. Parallelization Techniques for Verifying Neural Networks , 2020, 2020 Formal Methods in Computer Aided Design (FMCAD).
[62] Charles Elkan,et al. Learning to Diagnose with LSTM Recurrent Neural Networks , 2015, ICLR.
[63] PAUL J. WERBOS,et al. Generalization of backpropagation with application to a recurrent gas market model , 1988, Neural Networks.
[64] Xin Zhang,et al. End to End Learning for Self-Driving Cars , 2016, ArXiv.
[65] Weiming Xiang,et al. Reachability Analysis and Safety Verification for Neural Network Control Systems , 2018, ArXiv.