Scalable Certified Segmentation via Randomized Smoothing
暂无分享,去创建一个
[1] Teoria Statistica Delle Classi e Calcolo Delle Probabilità , 2022, The SAGE Encyclopedia of Research Design.
[2] Martin Vechev,et al. Robustness Certification for Point Cloud Models , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[3] Maximilian Baader,et al. Efficient Certification of Spatial Robustness , 2020, AAAI.
[4] Bhavya Kailkhura,et al. TSS: Transformation-Specific Smoothing for Robustness Certification , 2020, CCS.
[5] Yang Zhao,et al. Deep High-Resolution Representation Learning for Visual Recognition , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] J. Zico Kolter,et al. Provably robust classification of adversarial examples with detection , 2021, ICLR.
[7] Taylor T. Johnson,et al. Robustness Verification of Semantic Segmentation Neural Networks Using Relaxed Reachability , 2021, CAV.
[8] Pin-Yu Chen,et al. Higher-Order Certification for Randomized Smoothing , 2020, NeurIPS.
[9] Stephan Günnemann,et al. Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized Smoothing for Graphs, Images and More , 2020, ICML.
[10] Tom Goldstein,et al. Detection as Regression: Certified Object Detection by Median Smoothing , 2020, ArXiv.
[11] Qi Alfred Chen,et al. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures , 2020, USENIX Security Symposium.
[12] Pin-Yu Chen,et al. Towards Verifying Robustness of Neural Networks Against A Family of Semantic Perturbations , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Jinwoo Shin,et al. Consistency Regularization for Certified Robustness of Smoothed Classifiers , 2020, NeurIPS.
[14] Mislav Balunovic,et al. Adversarial Training and Provable Defenses: Bridging the Gap , 2020, ICLR.
[15] Mingjie Sun,et al. Denoised Smoothing: A Provable Defense for Pretrained Classifiers , 2020, NeurIPS.
[16] Zhuguo Li,et al. PointASNL: Robust Point Clouds Processing Using Nonlocal Neural Networks With Adaptive Sampling , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[17] Maximilian Baader,et al. Certified Defense to Image Transformations via Randomized Smoothing , 2020, NeurIPS.
[18] Alexander Levine,et al. (De)Randomized Smoothing for Certifiable Defense against Patch Attacks , 2020, NeurIPS.
[19] Ilya P. Razenshteyn,et al. Randomized Smoothing of All Shapes and Sizes , 2020, ICML.
[20] Martin Vechev,et al. Adversarial Robustness for Code , 2020, ICML.
[21] Cho-Jui Hsieh,et al. MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius , 2020, ICLR.
[22] Soheil Feizi,et al. Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks , 2019, AISTATS.
[23] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[24] Greg Yang,et al. Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers , 2019, NeurIPS.
[25] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[26] Hao Su,et al. Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[27] Timon Gehr,et al. An abstract domain for certifying neural networks , 2019, Proc. ACM Program. Lang..
[28] Chong Xiang,et al. Generating 3D Adversarial Point Clouds , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[30] Martin Vechev,et al. Beyond the Single Neuron Convex Barrier for Neural Network Certification , 2019, NeurIPS.
[31] Mislav Balunovic,et al. Certifying Geometric Robustness of Neural Networks , 2019, NeurIPS.
[32] Aditi Raghunathan,et al. Semidefinite relaxations for certifying robustness to adversarial examples , 2018, NeurIPS.
[33] Cho-Jui Hsieh,et al. Efficient Neural Network Robustness Certification with General Activation Functions , 2018, NeurIPS.
[34] Timothy A. Mann,et al. On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models , 2018, ArXiv.
[35] Junfeng Yang,et al. Efficient Formal Safety Analysis of Neural Networks , 2018, NeurIPS.
[36] Lawrence Carin,et al. Second-Order Adversarial Attack and Certifiable Robustness , 2018, ArXiv.
[37] Matthew Mirman,et al. Differentiable Abstract Interpretation for Provably Robust Neural Networks , 2018, ICML.
[38] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[39] Inderjit S. Dhillon,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018, ICML.
[40] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[41] Philip H. S. Torr,et al. On the Robustness of Semantic Segmentation Models to Adversarial Attacks , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[42] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[43] Christian S. Perone,et al. Spinal cord gray matter segmentation using deep dilated convolutions , 2017, Scientific Reports.
[44] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[45] A. Hardness,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018 .
[46] Leonidas J. Guibas,et al. PointNet++: Deep Hierarchical Feature Learning on Point Sets in a Metric Space , 2017, NIPS.
[47] Ming Yang,et al. CNN based semantic segmentation for urban traffic scenes using fisheye camera , 2017, 2017 IEEE Intelligent Vehicles Symposium (IV).
[48] Rüdiger Ehlers,et al. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks , 2017, ATVA.
[49] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[50] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[51] Leonidas J. Guibas,et al. PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[52] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[53] Sebastian Ramos,et al. The Cityscapes Dataset for Semantic Urban Scene Understanding , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[54] C. Qi. Deep Learning on Point Sets for 3 D Classification and Segmentation , 2016 .
[55] Leonidas J. Guibas,et al. ShapeNet: An Information-Rich 3D Model Repository , 2015, ArXiv.
[56] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[57] Sanja Fidler,et al. The Role of Context for Object Detection and Semantic Segmentation in the Wild , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[58] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[59] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[60] Joseph P. Romano,et al. Generalizations of the familywise error rate , 2005, math/0507420.
[61] G. E. Thomas. Resampling‐Based Multiple Testing: Examples and Methods for p‐Value Adjustment , 1994 .
[62] S. S. Young,et al. Resampling-Based Multiple Testing: Examples and Methods for p-Value Adjustment , 1993 .
[63] P. Westfall. Simultaneous small-sample multivariate Bernoulli confidence intervals. , 1985, Biometrics.
[64] S. Holm. A Simple Sequentially Rejective Multiple Test Procedure , 1979 .
[65] Z. Šidák. Rectangular Confidence Regions for the Means of Multivariate Normal Distributions , 1967 .
[66] A. Savitzky,et al. Smoothing and Differentiation of Data by Simplified Least Squares Procedures. , 1964 .
[67] J. Tukey. Comparing individual means in the analysis of variance. , 1949, Biometrics.
[68] E. S. Pearson,et al. THE USE OF CONFIDENCE OR FIDUCIAL LIMITS ILLUSTRATED IN THE CASE OF THE BINOMIAL , 1934 .