Accelerate adversarial training with loss guided propagation for robust image classification
暂无分享,去创建一个
[1] S. Ananiadou,et al. A mental state Knowledge-aware and Contrastive Network for early stress and depression detection on social media , 2022, Inf. Process. Manag..
[2] Zhi Zhong,et al. Adaptive and structured graph learning for semi-supervised clustering , 2022, Inf. Process. Manag..
[3] Shuicheng Yan,et al. A Survey on Concept Factorization: From Shallow to Deep Representation Learning , 2020, Inf. Process. Manag..
[4] Yu Cheng,et al. Large-Scale Adversarial Training for Vision-and-Language Representation Learning , 2020, NeurIPS.
[5] Lin-shan Lee,et al. Defending Your Voice: Adversarial Attack on Voice Conversion , 2020, 2021 IEEE Spoken Language Technology Workshop (SLT).
[6] Yisen Wang,et al. Adversarial Weight Perturbation Helps Robust Generalization , 2020, NeurIPS.
[7] Siddhant Garg,et al. BAE: BERT-based Adversarial Examples for Text Classification , 2020, EMNLP.
[8] Stefano Ermon,et al. Diversity can be Transferred: Output Diversification for White- and Black-box Attacks , 2020, NeurIPS.
[9] Yingying Chen,et al. Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems , 2020, IEEE International Conference on Acoustics, Speech, and Signal Processing.
[10] Matthias Hein,et al. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.
[11] Mohan S. Kankanhalli,et al. Attacks Which Do Not Kill Training Make Adversarial Learning Stronger , 2020, ICML.
[12] Hang Su,et al. Boosting Adversarial Training with Hypersphere Embedding , 2020, NeurIPS.
[13] Nicolas Flammarion,et al. Square Attack: a query-efficient black-box adversarial attack via random search , 2019, ECCV.
[14] Quanfu Fan,et al. Adversarial T-Shirt! Evading Person Detectors in a Physical World , 2019, ECCV.
[15] Zhanxing Zhu,et al. Amata: An Annealing Mechanism for Adversarial Training Acceleration , 2019, AAAI.
[16] Aleksandr Petiushko,et al. AdvHat: Real-World Adversarial Attack on ArcFace Face ID System , 2019, 2020 25th International Conference on Pattern Recognition (ICPR).
[17] Haichao Zhang,et al. Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training , 2019, NeurIPS.
[18] Gang Wang,et al. Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.
[19] Matthias Hein,et al. Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack , 2019, ICML.
[20] Ludwig Schmidt,et al. Unlabeled Data Improves Adversarial Robustness , 2019, NeurIPS.
[21] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Attacks on Text Classifiers , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[23] Hao Su,et al. Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[24] Richa Singh,et al. SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[25] Kui Ren,et al. Distributionally Adversarial Attack , 2018, AAAI.
[26] Shuicheng Yan,et al. Robust Adaptive Embedded Label Propagation With Weight Learning for Inductive Classification , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[27] Shuicheng Yan,et al. Jointly Learning Structured Analysis Discriminative Dictionary and Analysis Multiclass Classifier , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[28] Hongxia Yang,et al. Adversarial Detection with Model Interpretation , 2018, KDD.
[29] Zhao Zhang,et al. Adaptive Neighborhood Propagation by Joint L2,1-Norm Regularized Sparse Coding for Representation and Classification , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[30] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[31] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[32] Li Zhang,et al. Joint Low-Rank and Sparse Principal Feature Coding for Enhanced Robust Representation and Visual Classification , 2016, IEEE Transactions on Image Processing.
[33] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[34] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.