暂无分享,去创建一个
Hongtu Zhu | Hai Shu | Hongtu Zhu | Hai Shu
[1] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[2] Shun-ichi Amari,et al. Methods of information geometry , 2000 .
[3] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Xin Zhang,et al. End to End Learning for Self-Driving Cars , 2016, ArXiv.
[5] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Gabriel Kreiman,et al. On the Robustness of Convolutional Neural Networks to Internal Architecture and Weight Perturbations , 2017, ArXiv.
[7] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[8] J. Ibrahim,et al. Perturbation selection and influence measures in local influence analysis , 2007, 0803.2986.
[9] Tsuyoshi Murata,et al. {m , 1934, ACML.
[10] J. Ibrahim,et al. Bayesian influence analysis: a geometric approach. , 2011, Biometrika.
[11] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[12] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[13] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[14] Matthias Hein,et al. Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation , 2017, NIPS.
[15] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[17] Jinfeng Yi,et al. Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach , 2018, ICLR.
[18] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[19] Jascha Sohl-Dickstein,et al. Sensitivity and Generalization in Neural Networks: an Empirical Study , 2018, ICLR.
[20] Seyed-Mohsen Moosavi-Dezfooli,et al. The Robustness of Deep Networks: A Geometrical Perspective , 2017, IEEE Signal Processing Magazine.
[21] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[22] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[23] R. Cook. Assessment of Local Influence , 1986 .
[24] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[25] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[26] Shun-ichi Amari,et al. Differential-geometrical methods in statistics , 1985 .
[27] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[28] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[29] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[30] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[31] Lujo Bauer,et al. Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition , 2018, ArXiv.