暂无分享,去创建一个
Taylor T. Johnson | Hoang-Dung Tran | Bardh Hoxha | Danil Prokhorov | Tomoya Yamaguchi | Xiaodong Yang | Taylor T Johnson | D. Prokhorov | Bardh Hoxha | Tomoya Yamaguchi | Hoang-Dung Tran | Xiaodong Yang
[1] Pushmeet Kohli,et al. A Dual Approach to Scalable Verification of Deep Networks , 2018, UAI.
[2] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[3] Russ Tedrake,et al. Evaluating Robustness of Neural Networks with Mixed Integer Programming , 2017, ICLR.
[4] Weiming Xiang,et al. Reachable Set Computation and Safety Verification for Neural Networks with ReLU Activations , 2017, ArXiv.
[5] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[6] Weiming Xiang,et al. Output Reachable Set Estimation and Verification for Multilayer Neural Networks , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[7] Razvan Pascanu,et al. On the Number of Linear Regions of Deep Neural Networks , 2014, NIPS.
[8] Jelena Kocić,et al. An End-to-End Deep Neural Network for Autonomous Driving Designed for Embedded Automotive Platforms , 2019, Sensors.
[9] Kouichi Sakurai,et al. Attacking convolutional neural network using differential evolution , 2018, IPSJ Transactions on Computer Vision and Applications.
[10] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[11] Isil Dillig,et al. Optimization and abstraction: a synergistic approach for analyzing neural network robustness , 2019, PLDI.
[12] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[13] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[14] Helder Araújo,et al. Deep EndoVO: A recurrent convolutional neural network (RCNN) based visual odometry approach for endoscopic capsule robots , 2017, Neurocomputing.
[15] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[16] Christian Tjandraatmadja,et al. Bounding and Counting Linear Regions of Deep Neural Networks , 2017, ICML.
[17] David Rolnick,et al. Complexity of Linear Regions in Deep Networks , 2019, ICML.
[18] Alexander Rakhlin,et al. Automatic Instrument Segmentation in Robot-Assisted Surgery Using Deep Learning , 2018, bioRxiv.
[19] Alessio Lomuscio,et al. An approach to reachability analysis for feed-forward ReLU neural networks , 2017, ArXiv.
[20] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[21] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[22] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[23] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[24] Alessio Lomuscio,et al. Formal Verification of CNN-based Perception Systems , 2018, ArXiv.
[25] Timon Gehr,et al. An abstract domain for certifying neural networks , 2019, Proc. ACM Program. Lang..
[26] Alexander Binder,et al. Evaluating the Visualization of What a Deep Neural Network Has Learned , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[27] Seyed-Mohsen Moosavi-Dezfooli,et al. SparseFool: A Few Pixels Make a Big Difference , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[29] Inderjit S. Dhillon,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018, ICML.
[30] Weiming Xiang,et al. Star-Based Reachability Analysis of Deep Neural Networks , 2019, FM.
[31] Zhiwei Jia,et al. One-pixel Signature: Characterizing CNN Models for Backdoor Detection , 2020, ECCV.
[32] Wojciech Samek,et al. Methods for interpreting and understanding deep neural networks , 2017, Digit. Signal Process..
[33] Aleksander Madry,et al. On Adaptive Attacks to Adversarial Example Defenses , 2020, NeurIPS.
[34] Rüdiger Ehlers,et al. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks , 2017, ATVA.
[35] Weiming Xiang,et al. Verification of Deep Convolutional Neural Networks Using ImageStars , 2020, CAV.
[36] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[37] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[38] Juan Pablo Vielma,et al. The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification , 2020, NeurIPS.
[39] Pushmeet Kohli,et al. A Unified View of Piecewise Linear Neural Network Verification , 2017, NeurIPS.
[40] Weiming Xiang,et al. NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems , 2020, CAV.
[41] Martin Vechev,et al. Beyond the Single Neuron Convex Barrier for Neural Network Certification , 2019, NeurIPS.
[42] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[43] Mykel J. Kochenderfer,et al. The Marabou Framework for Verification and Analysis of Deep Neural Networks , 2019, CAV.
[44] Junfeng Yang,et al. Formal Security Analysis of Neural Networks using Symbolic Intervals , 2018, USENIX Security Symposium.
[45] Matthew Mirman,et al. Fast and Effective Robustness Certification , 2018, NeurIPS.
[46] Max Welling,et al. Visualizing Deep Neural Network Decisions: Prediction Difference Analysis , 2017, ICLR.
[47] Antonio Criminisi,et al. Measuring Neural Net Robustness with Constraints , 2016, NIPS.
[48] Daniel Kroening,et al. Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the Hamming Distance , 2019, IJCAI.
[49] Günter M. Ziegler,et al. 15 BASIC PROPERTIES OF CONVEX POLYTOPES , 2017 .
[50] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[51] Timon Gehr,et al. Boosting Robustness Certification of Neural Networks , 2018, ICLR.
[52] Weiming Xiang,et al. Reachability Analysis for Feed-Forward Neural Networks using Face Lattices , 2020, ArXiv.
[53] Ashish Tiwari,et al. Output Range Analysis for Deep Feedforward Neural Networks , 2018, NFM.