暂无分享,去创建一个
Yiren Zhao | Ross Anderson | Robert Mullins | Ilia Shumailov | R. Mullins | Ilia Shumailov | Ross Anderson | Yiren Zhao
[1] Michael Carbin,et al. The Lottery Ticket Hypothesis: Finding Sparse, Trainable Neural Networks , 2018, ICLR.
[2] Ran El-Yaniv,et al. Quantized Neural Networks: Training Neural Networks with Low Precision Weights and Activations , 2016, J. Mach. Learn. Res..
[3] Chengzhong Xu,et al. Mayo: A Framework for Auto-generating Hardware Friendly Deep Neural Networks , 2018, EMDL@MobiSys.
[4] Dan Boneh,et al. The Space of Transferable Adversarial Examples , 2017, ArXiv.
[5] Cheng-Zhong Xu,et al. Sitatapatra: Blocking the Transfer of Adversarial Samples , 2019, ArXiv.
[6] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[7] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[8] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[9] Dongyoung Kim,et al. ZeNA: Zero-Aware Neural Network Accelerator , 2018, IEEE Design & Test.
[10] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[11] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[12] Bin Liu,et al. Ternary Weight Networks , 2016, ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[14] Ran El-Yaniv,et al. Binarized Neural Networks , 2016, NIPS.
[15] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[16] Song Han,et al. EIE: Efficient Inference Engine on Compressed Deep Neural Network , 2016, 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).
[17] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[20] Mingjie Sun,et al. Rethinking the Value of Network Pruning , 2018, ICLR.
[21] Sachin S. Talathi,et al. Fixed Point Quantization of Deep Convolutional Networks , 2015, ICML.
[22] Yiren Zhao,et al. The Taboo Trap: Behavioural Detection of Adversarial Samples , 2018, ArXiv.
[23] Ali Farhadi,et al. Bidirectional Attention Flow for Machine Comprehension , 2016, ICLR.
[24] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[26] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[27] William J. Dally,et al. SCNN: An accelerator for compressed-sparse convolutional neural networks , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[28] Joel Emer,et al. Eyeriss: a spatial architecture for energy-efficient dataflow for convolutional neural networks , 2016, CARN.
[29] Yurong Chen,et al. Dynamic Network Surgery for Efficient DNNs , 2016, NIPS.