暂无分享,去创建一个
Stratis Ioannidis | Jennifer Dy | Aria Masoomi | Jennifer G. Dy | Tong Jian | Zifeng Wang | A. Masoomi | Stratis Ioannidis | Zifeng Wang | T. Jian
[1] Andrew L. Beam,et al. Adversarial attacks on medical machine learning , 2019, Science.
[2] Aleksander Madry,et al. Robustness May Be at Odds with Accuracy , 2018, ICLR.
[3] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[4] John Duchi,et al. Understanding and Mitigating the Tradeoff Between Robustness and Accuracy , 2020, ICML.
[5] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[6] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[7] Uri Shalit,et al. Robust learning with the Hilbert-Schmidt independence criterion , 2019, ICML.
[8] Jun S. Liu,et al. Siegel ’ s formula via Stein ’ s identities , 2003 .
[9] Bernhard C. Geiger,et al. How (Not) To Train Your Neural Network Using the Information Bottleneck Principle , 2018, ArXiv.
[10] David D. Cox,et al. On the information bottleneck theory of deep learning , 2018, ICLR.
[11] Naftali Tishby,et al. Deep learning and the information bottleneck principle , 2015, 2015 IEEE Information Theory Workshop (ITW).
[12] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[13] Jennifer G. Dy,et al. Solving Interpretable Kernel Dimensionality Reduction , 2019, NeurIPS.
[14] James Bailey,et al. Improving Adversarial Robustness Requires Revisiting Misclassified Examples , 2020, ICLR.
[15] Hao Cheng,et al. Adversarial Robustness vs. Model Compression, or Both? , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[16] Ian S. Fischer,et al. The Conditional Entropy Bottleneck , 2020, Entropy.
[17] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[20] Le Song,et al. Feature Selection via Dependence Maximization , 2012, J. Mach. Learn. Res..
[21] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Bernhard Schölkopf,et al. Measuring Statistical Dependence with Hilbert-Schmidt Norms , 2005, ALT.
[23] Changshui Zhang,et al. Deep Defense: Training DNNs with Improved Adversarial Robustness , 2018, NeurIPS.
[24] Alexander A. Alemi,et al. Deep Variational Information Bottleneck , 2017, ICLR.
[25] Stratis Ioannidis,et al. Open-World Class Discovery with Kernel Networks , 2020, 2020 IEEE International Conference on Data Mining (ICDM).
[26] Cristina Nita-Rotaru,et al. Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[27] Naftali Tishby,et al. Opening the Black Box of Deep Neural Networks via Information , 2017, ArXiv.
[28] Stratis Ioannidis,et al. Deep Kernel Learning for Clustering , 2019, SDM.
[29] Naftali Tishby,et al. The information bottleneck method , 2000, ArXiv.
[30] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[31] Matthias Hein,et al. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.
[32] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[33] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[34] W. Bastiaan Kleijn,et al. The HSIC Bottleneck: Deep Learning without Back-Propagation , 2019, AAAI.
[35] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[36] P. Cincotta,et al. Conditional Entropy , 1999 .
[37] Toon Goedemé,et al. Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[38] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.