暂无分享,去创建一个
Xinchao Wang | Cheng Jin | Mingli Song | Yining Mao | Jie Song | Jingwen Ye | Jie Song | Xinchao Wang | Mingli Song | Cheng Jin | Jingwen Ye | Yining Mao
[1] Mauro Barni,et al. A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[2] Jinyuan Jia,et al. Backdoor Attacks to Graph Neural Networks , 2020, SACMAT.
[3] Shin'ichi Satoh,et al. Digital watermarking for deep neural networks , 2018, International Journal of Multimedia Information Retrieval.
[4] Yan Lu,et al. Relational Knowledge Distillation , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Chun Chen,et al. Online Knowledge Distillation with Diverse Peers , 2019, AAAI.
[6] Li Sun,et al. Amalgamating Knowledge towards Comprehensive Classification , 2018, AAAI.
[7] Hamed Pirsiavash,et al. Hidden Trigger Backdoor Attacks , 2019, AAAI.
[8] Dacheng Tao,et al. On Compressing Deep Models by Low Rank and Sparse Decomposition , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Nikos Komodakis,et al. Paying More Attention to Attention: Improving the Performance of Convolutional Neural Networks via Attention Transfer , 2016, ICLR.
[10] Yufeng Li,et al. A Backdoor Attack Against LSTM-Based Text Classification Systems , 2019, IEEE Access.
[11] Seyed Iman Mirzadeh,et al. Improved Knowledge Distillation via Teacher Assistant , 2020, AAAI.
[12] Kai Yu,et al. Knowledge Distillation for Sequence Model , 2018, INTERSPEECH.
[13] James Bailey,et al. Clean-Label Backdoor Attacks on Video Recognition Models , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Kam Woh Ng,et al. DeepIP: Deep Neural Network Intellectual Property Protection with Passports. , 2021, IEEE transactions on pattern analysis and machine intelligence.
[15] Vitaly Shmatikov,et al. How To Backdoor Federated Learning , 2018, AISTATS.
[16] Jian Sun,et al. Identity Mappings in Deep Residual Networks , 2016, ECCV.
[17] Erwan Le Merrer,et al. Adversarial frontier stitching for remote neural network watermarking , 2017, Neural Computing and Applications.
[18] Xiangyu Zhang,et al. ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design , 2018, ECCV.
[19] Benny Pinkas,et al. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring , 2018, USENIX Security Symposium.
[20] Tinne Tuytelaars,et al. A Continual Learning Survey: Defying Forgetting in Classification Tasks , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Nicu Sebe,et al. PAD-Net: Multi-tasks Guided Prediction-and-Distillation Network for Simultaneous Depth Estimation and Scene Parsing , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[22] Yiyang Yao,et al. Neural Compatibility Modeling With Probabilistic Knowledge Distillation , 2020, IEEE Transactions on Image Processing.
[23] Hui Wu,et al. Protecting Intellectual Property of Deep Neural Networks with Watermarking , 2018, AsiaCCS.
[24] Hongyi Zhang,et al. mixup: Beyond Empirical Risk Minimization , 2017, ICLR.
[25] Tony X. Han,et al. Learning Efficient Object Detection Models with Knowledge Distillation , 2017, NIPS.
[26] John K. Tsotsos,et al. Incremental Learning Through Deep Adaptation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] Takashi Shibata,et al. Learning with Selective Forgetting , 2021, IJCAI.
[28] Ramakant Nevatia,et al. Knowledge Concentration: Learning 100K Object Classifiers in a Single CNN , 2017, ArXiv.
[29] Sencun Zhu,et al. Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation , 2018, CODASPY.
[30] Aleksander Madry,et al. Clean-Label Backdoor Attacks , 2018 .
[31] Ben Y. Zhao,et al. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[32] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[33] Zhangyang Wang,et al. Undistillable: Making A Nasty Teacher That CANNOT teach students , 2021, ICLR.
[34] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[35] Yunfei Liu,et al. Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks , 2020, ECCV.