暂无分享,去创建一个
Ning Chen | Jun Zhu | Chao Du | Kun Xu | Tianyu Pang | Jun Zhu | Kun Xu | Chao Du | Tianyu Pang | Ning Chen
[1] Hod Lipson,et al. Convergent Learning: Do different neural networks learn the same representations? , 2015, FE@NIPS.
[2] Jun Zhu,et al. Max-Mahalanobis Linear Discriminant Analysis Networks , 2018, ICML.
[3] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[4] Navdeep Jaitly,et al. Towards End-To-End Speech Recognition with Recurrent Neural Networks , 2014, ICML.
[5] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[6] Jun Zhu,et al. Towards Robust Detection of Adversarial Examples , 2017, NeurIPS.
[7] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[8] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[9] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[10] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[12] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[13] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[14] Ryan P. Adams,et al. Priors for Diversity in Generative Latent Variable Models , 2012, NIPS.
[15] Surya Ganguli,et al. Identifying and attacking the saddle point problem in high-dimensional non-convex optimization , 2014, NIPS.
[16] Suvrit Sra,et al. Diversity Networks , 2015, ICLR.
[17] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[18] Dennis S. Bernstein,et al. Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory , 2005 .
[19] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[20] Kilian Q. Weinberger,et al. On Calibration of Modern Neural Networks , 2017, ICML.
[21] Xin Yao,et al. Ensemble learning via negative correlation , 1999, Neural Networks.
[22] Yao Zhao,et al. Adversarial Attacks and Defences Competition , 2018, ArXiv.
[23] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[24] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[25] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[26] Ben Taskar,et al. Determinantal Point Processes for Machine Learning , 2012, Found. Trends Mach. Learn..
[27] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[28] Jinfeng Yi,et al. EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.
[29] Xiaolin Hu,et al. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[30] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[31] Anders Krogh,et al. Neural Network Ensembles, Cross Validation, and Active Learning , 1994, NIPS.
[32] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[33] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[34] Harini Kannan,et al. Adversarial Logit Pairing , 2018, NIPS 2018.
[35] Ludmila I. Kuncheva,et al. Measures of Diversity in Classifier Ensembles and Their Relationship with the Ensemble Accuracy , 2003, Machine Learning.
[36] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Xin Yao,et al. Simultaneous training of negatively correlated neural networks in an ensemble , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[38] Xin Yao,et al. A constructive algorithm for training cooperative neural network ensembles , 2003, IEEE Trans. Neural Networks.
[39] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[40] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[41] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[42] Mykola Pechenizkiy,et al. Diversity in search strategies for ensemble feature selection , 2005, Inf. Fusion.
[43] Kurt Hornik,et al. Multilayer feedforward networks are universal approximators , 1989, Neural Networks.
[44] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.